May 17 00:40:49.961172 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:40:49.961205 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:40:49.961224 kernel: BIOS-provided physical RAM map: May 17 00:40:49.961235 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:40:49.961246 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable May 17 00:40:49.961257 kernel: BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 17 00:40:49.961271 kernel: BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 17 00:40:49.961283 kernel: BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 17 00:40:49.961298 kernel: BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable May 17 00:40:49.961309 kernel: BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 17 00:40:49.961321 kernel: NX (Execute Disable) protection: active May 17 00:40:49.961333 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 17 00:40:49.961344 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 17 00:40:49.961356 kernel: extended physical RAM map: May 17 00:40:49.961397 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:40:49.961411 kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable May 17 00:40:49.961424 kernel: reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable May 17 00:40:49.961436 kernel: reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable May 17 00:40:49.961449 kernel: reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 17 00:40:49.961461 kernel: reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 17 00:40:49.961474 kernel: reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 17 00:40:49.961486 kernel: reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable May 17 00:40:49.961499 kernel: reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 17 00:40:49.961511 kernel: efi: EFI v2.70 by EDK II May 17 00:40:49.961526 kernel: efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77004a98 May 17 00:40:49.961539 kernel: SMBIOS 2.7 present. May 17 00:40:49.961552 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 May 17 00:40:49.961564 kernel: Hypervisor detected: KVM May 17 00:40:49.961577 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:40:49.961589 kernel: kvm-clock: cpu 0, msr 3419a001, primary cpu clock May 17 00:40:49.961602 kernel: kvm-clock: using sched offset of 4063198270 cycles May 17 00:40:49.961615 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:40:49.961628 kernel: tsc: Detected 2499.998 MHz processor May 17 00:40:49.961641 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:40:49.961654 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:40:49.961669 kernel: last_pfn = 0x7c97c max_arch_pfn = 0x400000000 May 17 00:40:49.961682 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:40:49.961695 kernel: Using GB pages for direct mapping May 17 00:40:49.961708 kernel: Secure boot disabled May 17 00:40:49.961721 kernel: ACPI: Early table checksum verification disabled May 17 00:40:49.961748 kernel: ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) May 17 00:40:49.961761 kernel: ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) May 17 00:40:49.961778 kernel: ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) May 17 00:40:49.961792 kernel: ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) May 17 00:40:49.961806 kernel: ACPI: FACS 0x00000000789D0000 000040 May 17 00:40:49.961820 kernel: ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) May 17 00:40:49.961834 kernel: ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) May 17 00:40:49.961848 kernel: ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) May 17 00:40:49.961862 kernel: ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) May 17 00:40:49.961879 kernel: ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) May 17 00:40:49.961893 kernel: ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 17 00:40:49.961907 kernel: ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 17 00:40:49.961921 kernel: ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) May 17 00:40:49.961935 kernel: ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] May 17 00:40:49.961949 kernel: ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] May 17 00:40:49.961963 kernel: ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] May 17 00:40:49.961977 kernel: ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] May 17 00:40:49.961991 kernel: ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] May 17 00:40:49.962007 kernel: ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] May 17 00:40:49.962022 kernel: ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] May 17 00:40:49.962035 kernel: ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] May 17 00:40:49.962049 kernel: ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] May 17 00:40:49.962063 kernel: ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] May 17 00:40:49.962077 kernel: ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] May 17 00:40:49.962091 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:40:49.962105 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:40:49.962118 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] May 17 00:40:49.962135 kernel: NUMA: Initialized distance table, cnt=1 May 17 00:40:49.962148 kernel: NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] May 17 00:40:49.962162 kernel: Zone ranges: May 17 00:40:49.962177 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:40:49.962190 kernel: DMA32 [mem 0x0000000001000000-0x000000007c97bfff] May 17 00:40:49.962203 kernel: Normal empty May 17 00:40:49.962217 kernel: Movable zone start for each node May 17 00:40:49.962231 kernel: Early memory node ranges May 17 00:40:49.962245 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 17 00:40:49.962262 kernel: node 0: [mem 0x0000000000100000-0x00000000786cdfff] May 17 00:40:49.962276 kernel: node 0: [mem 0x00000000789de000-0x000000007c97bfff] May 17 00:40:49.962290 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] May 17 00:40:49.962304 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:40:49.962318 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 17 00:40:49.962331 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 17 00:40:49.962345 kernel: On node 0, zone DMA32: 13956 pages in unavailable ranges May 17 00:40:49.962359 kernel: ACPI: PM-Timer IO Port: 0xb008 May 17 00:40:49.962373 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:40:49.972452 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 May 17 00:40:49.972470 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:40:49.972485 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:40:49.972499 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:40:49.972514 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:40:49.972528 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:40:49.972543 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 17 00:40:49.972557 kernel: TSC deadline timer available May 17 00:40:49.972571 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:40:49.972589 kernel: [mem 0x7ca00000-0xffffffff] available for PCI devices May 17 00:40:49.972602 kernel: Booting paravirtualized kernel on KVM May 17 00:40:49.972616 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:40:49.972632 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:40:49.972646 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:40:49.972660 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:40:49.972675 kernel: pcpu-alloc: [0] 0 1 May 17 00:40:49.972688 kernel: kvm-guest: stealtime: cpu 0, msr 7a41c0c0 May 17 00:40:49.972702 kernel: kvm-guest: PV spinlocks enabled May 17 00:40:49.972720 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:40:49.972734 kernel: Built 1 zonelists, mobility grouping on. Total pages: 501318 May 17 00:40:49.972748 kernel: Policy zone: DMA32 May 17 00:40:49.972765 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:40:49.972781 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:40:49.972795 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:40:49.972810 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:40:49.972823 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:40:49.972841 kernel: Memory: 1876640K/2037804K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 160904K reserved, 0K cma-reserved) May 17 00:40:49.972855 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:40:49.972871 kernel: Kernel/User page tables isolation: enabled May 17 00:40:49.972884 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:40:49.972898 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:40:49.972913 kernel: rcu: Hierarchical RCU implementation. May 17 00:40:49.972929 kernel: rcu: RCU event tracing is enabled. May 17 00:40:49.972956 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:40:49.972971 kernel: Rude variant of Tasks RCU enabled. May 17 00:40:49.972985 kernel: Tracing variant of Tasks RCU enabled. May 17 00:40:49.973001 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:40:49.973015 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:40:49.973033 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 17 00:40:49.973048 kernel: random: crng init done May 17 00:40:49.973062 kernel: Console: colour dummy device 80x25 May 17 00:40:49.973076 kernel: printk: console [tty0] enabled May 17 00:40:49.973091 kernel: printk: console [ttyS0] enabled May 17 00:40:49.973106 kernel: ACPI: Core revision 20210730 May 17 00:40:49.973121 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns May 17 00:40:49.973139 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:40:49.973154 kernel: x2apic enabled May 17 00:40:49.973169 kernel: Switched APIC routing to physical x2apic. May 17 00:40:49.973184 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns May 17 00:40:49.973199 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) May 17 00:40:49.973214 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 00:40:49.973229 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 00:40:49.973247 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:40:49.973261 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:40:49.973275 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:40:49.973290 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 17 00:40:49.973305 kernel: RETBleed: Vulnerable May 17 00:40:49.973320 kernel: Speculative Store Bypass: Vulnerable May 17 00:40:49.973334 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:40:49.973348 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:40:49.973363 kernel: GDS: Unknown: Dependent on hypervisor status May 17 00:40:49.973387 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:40:49.981489 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:40:49.981519 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:40:49.981535 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' May 17 00:40:49.981549 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' May 17 00:40:49.981563 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 17 00:40:49.981577 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 17 00:40:49.981596 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 17 00:40:49.981611 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' May 17 00:40:49.981626 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:40:49.981644 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 May 17 00:40:49.981660 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 May 17 00:40:49.981674 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 May 17 00:40:49.981691 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 May 17 00:40:49.981706 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 May 17 00:40:49.981726 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 May 17 00:40:49.981748 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. May 17 00:40:49.981762 kernel: Freeing SMP alternatives memory: 32K May 17 00:40:49.981776 kernel: pid_max: default: 32768 minimum: 301 May 17 00:40:49.981790 kernel: LSM: Security Framework initializing May 17 00:40:49.981805 kernel: SELinux: Initializing. May 17 00:40:49.981819 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:40:49.981834 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:40:49.981849 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) May 17 00:40:49.981867 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 17 00:40:49.981881 kernel: signal: max sigframe size: 3632 May 17 00:40:49.981895 kernel: rcu: Hierarchical SRCU implementation. May 17 00:40:49.981912 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:40:49.981930 kernel: smp: Bringing up secondary CPUs ... May 17 00:40:49.981945 kernel: x86: Booting SMP configuration: May 17 00:40:49.981960 kernel: .... node #0, CPUs: #1 May 17 00:40:49.981975 kernel: kvm-clock: cpu 1, msr 3419a041, secondary cpu clock May 17 00:40:49.981990 kernel: kvm-guest: stealtime: cpu 1, msr 7a51c0c0 May 17 00:40:49.982009 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 17 00:40:49.982026 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 00:40:49.982040 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:40:49.982054 kernel: smpboot: Max logical packages: 1 May 17 00:40:49.982069 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) May 17 00:40:49.982088 kernel: devtmpfs: initialized May 17 00:40:49.982104 kernel: x86/mm: Memory block size: 128MB May 17 00:40:49.982118 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) May 17 00:40:49.982134 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:40:49.982151 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:40:49.982166 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:40:49.982180 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:40:49.982195 kernel: audit: initializing netlink subsys (disabled) May 17 00:40:49.982209 kernel: audit: type=2000 audit(1747442449.965:1): state=initialized audit_enabled=0 res=1 May 17 00:40:49.982229 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:40:49.982245 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:40:49.982260 kernel: cpuidle: using governor menu May 17 00:40:49.982275 kernel: ACPI: bus type PCI registered May 17 00:40:49.982293 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:40:49.982307 kernel: dca service started, version 1.12.1 May 17 00:40:49.982322 kernel: PCI: Using configuration type 1 for base access May 17 00:40:49.982337 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:40:49.982352 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:40:49.982367 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:40:49.985955 kernel: ACPI: Added _OSI(Module Device) May 17 00:40:49.985987 kernel: ACPI: Added _OSI(Processor Device) May 17 00:40:49.986003 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:40:49.986024 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:40:49.986039 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:40:49.986053 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:40:49.986067 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:40:49.986082 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 17 00:40:49.986096 kernel: ACPI: Interpreter enabled May 17 00:40:49.986110 kernel: ACPI: PM: (supports S0 S5) May 17 00:40:49.986125 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:40:49.986140 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:40:49.986158 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 17 00:40:49.986172 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:40:49.986402 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 17 00:40:49.986532 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 17 00:40:49.986550 kernel: acpiphp: Slot [3] registered May 17 00:40:49.986565 kernel: acpiphp: Slot [4] registered May 17 00:40:49.986581 kernel: acpiphp: Slot [5] registered May 17 00:40:49.986599 kernel: acpiphp: Slot [6] registered May 17 00:40:49.986613 kernel: acpiphp: Slot [7] registered May 17 00:40:49.986628 kernel: acpiphp: Slot [8] registered May 17 00:40:49.986642 kernel: acpiphp: Slot [9] registered May 17 00:40:49.986656 kernel: acpiphp: Slot [10] registered May 17 00:40:49.986669 kernel: acpiphp: Slot [11] registered May 17 00:40:49.986684 kernel: acpiphp: Slot [12] registered May 17 00:40:49.986698 kernel: acpiphp: Slot [13] registered May 17 00:40:49.986713 kernel: acpiphp: Slot [14] registered May 17 00:40:49.986727 kernel: acpiphp: Slot [15] registered May 17 00:40:49.986744 kernel: acpiphp: Slot [16] registered May 17 00:40:49.986758 kernel: acpiphp: Slot [17] registered May 17 00:40:49.986773 kernel: acpiphp: Slot [18] registered May 17 00:40:49.986787 kernel: acpiphp: Slot [19] registered May 17 00:40:49.986802 kernel: acpiphp: Slot [20] registered May 17 00:40:49.986816 kernel: acpiphp: Slot [21] registered May 17 00:40:49.986831 kernel: acpiphp: Slot [22] registered May 17 00:40:49.986844 kernel: acpiphp: Slot [23] registered May 17 00:40:49.986858 kernel: acpiphp: Slot [24] registered May 17 00:40:49.986875 kernel: acpiphp: Slot [25] registered May 17 00:40:49.986890 kernel: acpiphp: Slot [26] registered May 17 00:40:49.986904 kernel: acpiphp: Slot [27] registered May 17 00:40:49.986918 kernel: acpiphp: Slot [28] registered May 17 00:40:49.986932 kernel: acpiphp: Slot [29] registered May 17 00:40:49.986946 kernel: acpiphp: Slot [30] registered May 17 00:40:49.986960 kernel: acpiphp: Slot [31] registered May 17 00:40:49.986974 kernel: PCI host bridge to bus 0000:00 May 17 00:40:49.987092 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:40:49.987204 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:40:49.987307 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:40:49.996555 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 17 00:40:49.996700 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] May 17 00:40:49.996808 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:40:49.996960 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 17 00:40:49.997095 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 17 00:40:49.997234 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 May 17 00:40:49.997357 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 17 00:40:49.997491 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff May 17 00:40:49.997603 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff May 17 00:40:49.997722 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff May 17 00:40:49.997849 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff May 17 00:40:49.997973 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff May 17 00:40:49.998098 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff May 17 00:40:49.998233 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 May 17 00:40:49.998366 kernel: pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] May 17 00:40:49.998514 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 17 00:40:49.998648 kernel: pci 0000:00:03.0: BAR 0: assigned to efifb May 17 00:40:49.998782 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:40:49.998931 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 May 17 00:40:49.999064 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] May 17 00:40:49.999214 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 May 17 00:40:49.999348 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] May 17 00:40:49.999368 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:40:50.008751 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:40:50.013437 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:40:50.013483 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:40:50.013500 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 17 00:40:50.013516 kernel: iommu: Default domain type: Translated May 17 00:40:50.013532 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:40:50.013720 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device May 17 00:40:50.013863 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:40:50.013990 kernel: pci 0000:00:03.0: vgaarb: bridge control possible May 17 00:40:50.014009 kernel: vgaarb: loaded May 17 00:40:50.014025 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:40:50.014044 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:40:50.014059 kernel: PTP clock support registered May 17 00:40:50.014073 kernel: Registered efivars operations May 17 00:40:50.014088 kernel: PCI: Using ACPI for IRQ routing May 17 00:40:50.014103 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:40:50.014119 kernel: e820: reserve RAM buffer [mem 0x76813018-0x77ffffff] May 17 00:40:50.014133 kernel: e820: reserve RAM buffer [mem 0x786ce000-0x7bffffff] May 17 00:40:50.014146 kernel: e820: reserve RAM buffer [mem 0x7c97c000-0x7fffffff] May 17 00:40:50.014160 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 May 17 00:40:50.014179 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter May 17 00:40:50.014193 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:40:50.014209 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:40:50.014224 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:40:50.014238 kernel: pnp: PnP ACPI init May 17 00:40:50.014253 kernel: pnp: PnP ACPI: found 5 devices May 17 00:40:50.014269 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:40:50.014284 kernel: NET: Registered PF_INET protocol family May 17 00:40:50.014299 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:40:50.014317 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 17 00:40:50.014332 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:40:50.014347 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:40:50.014362 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 17 00:40:50.014411 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 17 00:40:50.014435 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:40:50.014561 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:40:50.014576 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:40:50.014591 kernel: NET: Registered PF_XDP protocol family May 17 00:40:50.014729 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:40:50.014844 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:40:50.014955 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:40:50.015064 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 17 00:40:50.015173 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] May 17 00:40:50.015305 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:40:50.023780 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 17 00:40:50.023826 kernel: PCI: CLS 0 bytes, default 64 May 17 00:40:50.023842 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:40:50.023858 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns May 17 00:40:50.023870 kernel: clocksource: Switched to clocksource tsc May 17 00:40:50.023884 kernel: Initialise system trusted keyrings May 17 00:40:50.023898 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 17 00:40:50.023914 kernel: Key type asymmetric registered May 17 00:40:50.023927 kernel: Asymmetric key parser 'x509' registered May 17 00:40:50.023940 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:40:50.023958 kernel: io scheduler mq-deadline registered May 17 00:40:50.023972 kernel: io scheduler kyber registered May 17 00:40:50.023986 kernel: io scheduler bfq registered May 17 00:40:50.024000 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:40:50.024013 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:40:50.024028 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:40:50.024040 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:40:50.024056 kernel: i8042: Warning: Keylock active May 17 00:40:50.024072 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:40:50.024090 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:40:50.024251 kernel: rtc_cmos 00:00: RTC can wake from S4 May 17 00:40:50.025595 kernel: rtc_cmos 00:00: registered as rtc0 May 17 00:40:50.025800 kernel: rtc_cmos 00:00: setting system clock to 2025-05-17T00:40:49 UTC (1747442449) May 17 00:40:50.025944 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 17 00:40:50.025965 kernel: intel_pstate: CPU model not supported May 17 00:40:50.025982 kernel: efifb: probing for efifb May 17 00:40:50.025998 kernel: efifb: framebuffer at 0x80000000, using 1876k, total 1875k May 17 00:40:50.026020 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 May 17 00:40:50.026033 kernel: efifb: scrolling: redraw May 17 00:40:50.026046 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:40:50.026058 kernel: Console: switching to colour frame buffer device 100x37 May 17 00:40:50.026071 kernel: fb0: EFI VGA frame buffer device May 17 00:40:50.026084 kernel: pstore: Registered efi as persistent store backend May 17 00:40:50.026122 kernel: NET: Registered PF_INET6 protocol family May 17 00:40:50.026141 kernel: Segment Routing with IPv6 May 17 00:40:50.026157 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:40:50.026174 kernel: NET: Registered PF_PACKET protocol family May 17 00:40:50.026189 kernel: Key type dns_resolver registered May 17 00:40:50.026205 kernel: IPI shorthand broadcast: enabled May 17 00:40:50.026219 kernel: sched_clock: Marking stable (335203818, 136329741)->(556074499, -84540940) May 17 00:40:50.026233 kernel: registered taskstats version 1 May 17 00:40:50.026247 kernel: Loading compiled-in X.509 certificates May 17 00:40:50.026261 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:40:50.026275 kernel: Key type .fscrypt registered May 17 00:40:50.026289 kernel: Key type fscrypt-provisioning registered May 17 00:40:50.026307 kernel: pstore: Using crash dump compression: deflate May 17 00:40:50.026322 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:40:50.026336 kernel: ima: Allocated hash algorithm: sha1 May 17 00:40:50.026350 kernel: ima: No architecture policies found May 17 00:40:50.026365 kernel: clk: Disabling unused clocks May 17 00:40:50.026395 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:40:50.026409 kernel: Write protecting the kernel read-only data: 28672k May 17 00:40:50.026424 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:40:50.026439 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:40:50.026456 kernel: Run /init as init process May 17 00:40:50.026470 kernel: with arguments: May 17 00:40:50.026486 kernel: /init May 17 00:40:50.026500 kernel: with environment: May 17 00:40:50.026514 kernel: HOME=/ May 17 00:40:50.026529 kernel: TERM=linux May 17 00:40:50.026543 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:40:50.026562 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:40:50.026583 systemd[1]: Detected virtualization amazon. May 17 00:40:50.026599 systemd[1]: Detected architecture x86-64. May 17 00:40:50.026614 systemd[1]: Running in initrd. May 17 00:40:50.026629 systemd[1]: No hostname configured, using default hostname. May 17 00:40:50.026644 systemd[1]: Hostname set to . May 17 00:40:50.026660 systemd[1]: Initializing machine ID from VM UUID. May 17 00:40:50.026675 systemd[1]: Queued start job for default target initrd.target. May 17 00:40:50.026693 systemd[1]: Started systemd-ask-password-console.path. May 17 00:40:50.026712 systemd[1]: Reached target cryptsetup.target. May 17 00:40:50.026728 systemd[1]: Reached target paths.target. May 17 00:40:50.026743 systemd[1]: Reached target slices.target. May 17 00:40:50.026757 systemd[1]: Reached target swap.target. May 17 00:40:50.026773 systemd[1]: Reached target timers.target. May 17 00:40:50.026792 systemd[1]: Listening on iscsid.socket. May 17 00:40:50.026808 systemd[1]: Listening on iscsiuio.socket. May 17 00:40:50.026824 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:40:50.026839 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:40:50.026855 systemd[1]: Listening on systemd-journald.socket. May 17 00:40:50.026871 systemd[1]: Listening on systemd-networkd.socket. May 17 00:40:50.026886 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:40:50.026905 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:40:50.026921 systemd[1]: Reached target sockets.target. May 17 00:40:50.026937 systemd[1]: Starting kmod-static-nodes.service... May 17 00:40:50.026953 systemd[1]: Finished network-cleanup.service. May 17 00:40:50.026969 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:40:50.026985 systemd[1]: Starting systemd-journald.service... May 17 00:40:50.027001 systemd[1]: Starting systemd-modules-load.service... May 17 00:40:50.027016 systemd[1]: Starting systemd-resolved.service... May 17 00:40:50.027032 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:40:50.027051 systemd[1]: Finished kmod-static-nodes.service. May 17 00:40:50.027067 kernel: audit: type=1130 audit(1747442449.973:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.027084 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:40:50.027100 kernel: audit: type=1130 audit(1747442449.987:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.027116 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:40:50.027132 kernel: audit: type=1130 audit(1747442450.002:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.027148 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:40:50.027165 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:40:50.027183 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:40:50.027204 systemd-journald[185]: Journal started May 17 00:40:50.027281 systemd-journald[185]: Runtime Journal (/run/log/journal/ec23ec3ab38c06099418f5709e32eddf) is 4.8M, max 38.3M, 33.5M free. May 17 00:40:49.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:49.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:49.994794 systemd-modules-load[186]: Inserted module 'overlay' May 17 00:40:50.036515 systemd[1]: Started systemd-resolved.service. May 17 00:40:50.011176 systemd-resolved[187]: Positive Trust Anchors: May 17 00:40:50.066510 kernel: audit: type=1130 audit(1747442450.038:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.066547 systemd[1]: Started systemd-journald.service. May 17 00:40:50.066570 kernel: audit: type=1130 audit(1747442450.050:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.066590 kernel: audit: type=1130 audit(1747442450.051:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.011187 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:40:50.011233 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:40:50.091702 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:40:50.091740 kernel: Bridge firewalling registered May 17 00:40:50.091766 kernel: audit: type=1130 audit(1747442450.082:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.019427 systemd-resolved[187]: Defaulting to hostname 'linux'. May 17 00:40:50.050984 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:40:50.052203 systemd[1]: Reached target nss-lookup.target. May 17 00:40:50.079350 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:40:50.080881 systemd-modules-load[186]: Inserted module 'br_netfilter' May 17 00:40:50.084171 systemd[1]: Starting dracut-cmdline.service... May 17 00:40:50.107689 dracut-cmdline[202]: dracut-dracut-053 May 17 00:40:50.111792 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:40:50.120181 kernel: SCSI subsystem initialized May 17 00:40:50.138395 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:40:50.138472 kernel: device-mapper: uevent: version 1.0.3 May 17 00:40:50.141400 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:40:50.145299 systemd-modules-load[186]: Inserted module 'dm_multipath' May 17 00:40:50.146226 systemd[1]: Finished systemd-modules-load.service. May 17 00:40:50.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.154080 systemd[1]: Starting systemd-sysctl.service... May 17 00:40:50.155131 kernel: audit: type=1130 audit(1747442450.147:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.163775 systemd[1]: Finished systemd-sysctl.service. May 17 00:40:50.172370 kernel: audit: type=1130 audit(1747442450.164:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.200409 kernel: Loading iSCSI transport class v2.0-870. May 17 00:40:50.219409 kernel: iscsi: registered transport (tcp) May 17 00:40:50.244448 kernel: iscsi: registered transport (qla4xxx) May 17 00:40:50.244529 kernel: QLogic iSCSI HBA Driver May 17 00:40:50.276041 systemd[1]: Finished dracut-cmdline.service. May 17 00:40:50.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.278058 systemd[1]: Starting dracut-pre-udev.service... May 17 00:40:50.329412 kernel: raid6: avx512x4 gen() 18136 MB/s May 17 00:40:50.347401 kernel: raid6: avx512x4 xor() 8399 MB/s May 17 00:40:50.365405 kernel: raid6: avx512x2 gen() 18020 MB/s May 17 00:40:50.383398 kernel: raid6: avx512x2 xor() 24223 MB/s May 17 00:40:50.401405 kernel: raid6: avx512x1 gen() 18048 MB/s May 17 00:40:50.419397 kernel: raid6: avx512x1 xor() 21828 MB/s May 17 00:40:50.437405 kernel: raid6: avx2x4 gen() 17901 MB/s May 17 00:40:50.455397 kernel: raid6: avx2x4 xor() 7638 MB/s May 17 00:40:50.473405 kernel: raid6: avx2x2 gen() 17944 MB/s May 17 00:40:50.491399 kernel: raid6: avx2x2 xor() 18112 MB/s May 17 00:40:50.509405 kernel: raid6: avx2x1 gen() 13954 MB/s May 17 00:40:50.527397 kernel: raid6: avx2x1 xor() 15747 MB/s May 17 00:40:50.545402 kernel: raid6: sse2x4 gen() 9544 MB/s May 17 00:40:50.563397 kernel: raid6: sse2x4 xor() 6088 MB/s May 17 00:40:50.581402 kernel: raid6: sse2x2 gen() 10574 MB/s May 17 00:40:50.599397 kernel: raid6: sse2x2 xor() 6279 MB/s May 17 00:40:50.617407 kernel: raid6: sse2x1 gen() 9134 MB/s May 17 00:40:50.635615 kernel: raid6: sse2x1 xor() 4857 MB/s May 17 00:40:50.635655 kernel: raid6: using algorithm avx512x4 gen() 18136 MB/s May 17 00:40:50.635674 kernel: raid6: .... xor() 8399 MB/s, rmw enabled May 17 00:40:50.636710 kernel: raid6: using avx512x2 recovery algorithm May 17 00:40:50.651409 kernel: xor: automatically using best checksumming function avx May 17 00:40:50.753410 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:40:50.761925 systemd[1]: Finished dracut-pre-udev.service. May 17 00:40:50.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.762000 audit: BPF prog-id=7 op=LOAD May 17 00:40:50.762000 audit: BPF prog-id=8 op=LOAD May 17 00:40:50.763429 systemd[1]: Starting systemd-udevd.service... May 17 00:40:50.776460 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 17 00:40:50.781721 systemd[1]: Started systemd-udevd.service. May 17 00:40:50.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.784224 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:40:50.802816 dracut-pre-trigger[390]: rd.md=0: removing MD RAID activation May 17 00:40:50.833766 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:40:50.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.835220 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:40:50.876617 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:40:50.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:50.933404 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:40:50.967095 kernel: ena 0000:00:05.0: ENA device version: 0.10 May 17 00:40:50.990722 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 May 17 00:40:50.990893 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:40:50.990914 kernel: AES CTR mode by8 optimization enabled May 17 00:40:50.990941 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. May 17 00:40:50.991087 kernel: nvme nvme0: pci function 0000:00:04.0 May 17 00:40:50.991253 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 17 00:40:50.991274 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:3f:e5:f4:ec:db May 17 00:40:50.998408 kernel: nvme nvme0: 2/0/0 default/read/poll queues May 17 00:40:51.005973 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:40:51.006036 kernel: GPT:9289727 != 16777215 May 17 00:40:51.006058 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:40:51.007330 kernel: GPT:9289727 != 16777215 May 17 00:40:51.008330 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:40:51.010769 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:40:51.015817 (udev-worker)[432]: Network interface NamePolicy= disabled on kernel command line. May 17 00:40:51.068402 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (430) May 17 00:40:51.098672 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:40:51.134871 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:40:51.141350 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:40:51.142132 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:40:51.148789 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:40:51.154394 systemd[1]: Starting disk-uuid.service... May 17 00:40:51.162076 disk-uuid[594]: Primary Header is updated. May 17 00:40:51.162076 disk-uuid[594]: Secondary Entries is updated. May 17 00:40:51.162076 disk-uuid[594]: Secondary Header is updated. May 17 00:40:51.168415 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:40:51.172396 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:40:51.179442 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:40:52.185409 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:40:52.186072 disk-uuid[595]: The operation has completed successfully. May 17 00:40:52.284798 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:40:52.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:52.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:52.284891 systemd[1]: Finished disk-uuid.service. May 17 00:40:52.290998 systemd[1]: Starting verity-setup.service... May 17 00:40:52.317400 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:40:52.400296 systemd[1]: Found device dev-mapper-usr.device. May 17 00:40:52.401666 systemd[1]: Mounting sysusr-usr.mount... May 17 00:40:52.403636 systemd[1]: Finished verity-setup.service. May 17 00:40:52.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:52.498403 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:40:52.498921 systemd[1]: Mounted sysusr-usr.mount. May 17 00:40:52.499675 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:40:52.500396 systemd[1]: Starting ignition-setup.service... May 17 00:40:52.503520 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:40:52.530408 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:40:52.530469 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:40:52.530482 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:40:52.555403 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:40:52.566476 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:40:52.576332 systemd[1]: Finished ignition-setup.service. May 17 00:40:52.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:52.577731 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:40:52.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:52.584000 audit: BPF prog-id=9 op=LOAD May 17 00:40:52.584063 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:40:52.585912 systemd[1]: Starting systemd-networkd.service... May 17 00:40:52.614894 systemd-networkd[1107]: lo: Link UP May 17 00:40:52.614902 systemd-networkd[1107]: lo: Gained carrier May 17 00:40:52.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:52.615362 systemd-networkd[1107]: Enumeration completed May 17 00:40:52.615665 systemd-networkd[1107]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:40:52.616729 systemd[1]: Started systemd-networkd.service. May 17 00:40:52.617740 systemd[1]: Reached target network.target. May 17 00:40:52.619270 systemd-networkd[1107]: eth0: Link UP May 17 00:40:52.619276 systemd-networkd[1107]: eth0: Gained carrier May 17 00:40:52.621516 systemd[1]: Starting iscsiuio.service... May 17 00:40:52.630072 systemd[1]: Started iscsiuio.service. May 17 00:40:52.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:52.631750 systemd[1]: Starting iscsid.service... May 17 00:40:52.635517 systemd-networkd[1107]: eth0: DHCPv4 address 172.31.31.18/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 17 00:40:52.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:52.640288 iscsid[1112]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:40:52.640288 iscsid[1112]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:40:52.640288 iscsid[1112]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:40:52.640288 iscsid[1112]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:40:52.640288 iscsid[1112]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:40:52.640288 iscsid[1112]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:40:52.638001 systemd[1]: Started iscsid.service. May 17 00:40:52.640448 systemd[1]: Starting dracut-initqueue.service... May 17 00:40:52.658373 systemd[1]: Finished dracut-initqueue.service. May 17 00:40:52.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:52.659128 systemd[1]: Reached target remote-fs-pre.target. May 17 00:40:52.660250 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:40:52.661429 systemd[1]: Reached target remote-fs.target. May 17 00:40:52.663643 systemd[1]: Starting dracut-pre-mount.service... May 17 00:40:52.673005 systemd[1]: Finished dracut-pre-mount.service. May 17 00:40:52.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:53.003155 ignition[1103]: Ignition 2.14.0 May 17 00:40:53.003165 ignition[1103]: Stage: fetch-offline May 17 00:40:53.003271 ignition[1103]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:40:53.003303 ignition[1103]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:40:53.020451 ignition[1103]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:40:53.020817 ignition[1103]: Ignition finished successfully May 17 00:40:53.022753 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:40:53.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:53.024269 systemd[1]: Starting ignition-fetch.service... May 17 00:40:53.031837 ignition[1131]: Ignition 2.14.0 May 17 00:40:53.031849 ignition[1131]: Stage: fetch May 17 00:40:53.031995 ignition[1131]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:40:53.032016 ignition[1131]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:40:53.038099 ignition[1131]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:40:53.038784 ignition[1131]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:40:53.097406 ignition[1131]: INFO : PUT result: OK May 17 00:40:53.108478 ignition[1131]: DEBUG : parsed url from cmdline: "" May 17 00:40:53.108478 ignition[1131]: INFO : no config URL provided May 17 00:40:53.108478 ignition[1131]: INFO : reading system config file "/usr/lib/ignition/user.ign" May 17 00:40:53.108478 ignition[1131]: INFO : no config at "/usr/lib/ignition/user.ign" May 17 00:40:53.110859 ignition[1131]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:40:53.110859 ignition[1131]: INFO : PUT result: OK May 17 00:40:53.110859 ignition[1131]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 May 17 00:40:53.113368 ignition[1131]: INFO : GET result: OK May 17 00:40:53.113992 ignition[1131]: DEBUG : parsing config with SHA512: 2fdf7bc028a03e34b5cccb306e12c056ffb9051065f26e9187a2925ceadbe6be7db21b4ec4225d4b52a6ce37d76e05481a102598fc3d0084b8753aeeffe40723 May 17 00:40:53.115371 unknown[1131]: fetched base config from "system" May 17 00:40:53.116010 unknown[1131]: fetched base config from "system" May 17 00:40:53.116026 unknown[1131]: fetched user config from "aws" May 17 00:40:53.116931 ignition[1131]: fetch: fetch complete May 17 00:40:53.116937 ignition[1131]: fetch: fetch passed May 17 00:40:53.116986 ignition[1131]: Ignition finished successfully May 17 00:40:53.119935 systemd[1]: Finished ignition-fetch.service. May 17 00:40:53.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:53.121295 systemd[1]: Starting ignition-kargs.service... May 17 00:40:53.130806 ignition[1137]: Ignition 2.14.0 May 17 00:40:53.130817 ignition[1137]: Stage: kargs May 17 00:40:53.130959 ignition[1137]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:40:53.130979 ignition[1137]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:40:53.136071 ignition[1137]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:40:53.136752 ignition[1137]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:40:53.137365 ignition[1137]: INFO : PUT result: OK May 17 00:40:53.139554 ignition[1137]: kargs: kargs passed May 17 00:40:53.139600 ignition[1137]: Ignition finished successfully May 17 00:40:53.140892 systemd[1]: Finished ignition-kargs.service. May 17 00:40:53.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:53.142363 systemd[1]: Starting ignition-disks.service... May 17 00:40:53.150028 ignition[1143]: Ignition 2.14.0 May 17 00:40:53.150038 ignition[1143]: Stage: disks May 17 00:40:53.150185 ignition[1143]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:40:53.150207 ignition[1143]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:40:53.155703 ignition[1143]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:40:53.156446 ignition[1143]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:40:53.157112 ignition[1143]: INFO : PUT result: OK May 17 00:40:53.159450 ignition[1143]: disks: disks passed May 17 00:40:53.159499 ignition[1143]: Ignition finished successfully May 17 00:40:53.161235 systemd[1]: Finished ignition-disks.service. May 17 00:40:53.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:53.161972 systemd[1]: Reached target initrd-root-device.target. May 17 00:40:53.162434 systemd[1]: Reached target local-fs-pre.target. May 17 00:40:53.162860 systemd[1]: Reached target local-fs.target. May 17 00:40:53.163256 systemd[1]: Reached target sysinit.target. May 17 00:40:53.163647 systemd[1]: Reached target basic.target. May 17 00:40:53.164850 systemd[1]: Starting systemd-fsck-root.service... May 17 00:40:53.192485 systemd-fsck[1151]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 17 00:40:53.198983 systemd[1]: Finished systemd-fsck-root.service. May 17 00:40:53.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:53.200292 systemd[1]: Mounting sysroot.mount... May 17 00:40:53.220399 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:40:53.220840 systemd[1]: Mounted sysroot.mount. May 17 00:40:53.221952 systemd[1]: Reached target initrd-root-fs.target. May 17 00:40:53.226858 systemd[1]: Mounting sysroot-usr.mount... May 17 00:40:53.227958 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:40:53.228015 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:40:53.228040 systemd[1]: Reached target ignition-diskful.target. May 17 00:40:53.233313 systemd[1]: Mounted sysroot-usr.mount. May 17 00:40:53.234719 systemd[1]: Starting initrd-setup-root.service... May 17 00:40:53.239902 initrd-setup-root[1172]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:40:53.256578 initrd-setup-root[1180]: cut: /sysroot/etc/group: No such file or directory May 17 00:40:53.260466 initrd-setup-root[1188]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:40:53.264882 initrd-setup-root[1196]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:40:53.405231 systemd[1]: Finished initrd-setup-root.service. May 17 00:40:53.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:53.406761 systemd[1]: Starting ignition-mount.service... May 17 00:40:53.409429 systemd[1]: Starting sysroot-boot.service... May 17 00:40:53.413809 bash[1213]: umount: /sysroot/usr/share/oem: not mounted. May 17 00:40:53.422445 ignition[1214]: INFO : Ignition 2.14.0 May 17 00:40:53.422445 ignition[1214]: INFO : Stage: mount May 17 00:40:53.423828 ignition[1214]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:40:53.423828 ignition[1214]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:40:53.429314 ignition[1214]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:40:53.430093 ignition[1214]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:40:53.430093 ignition[1214]: INFO : PUT result: OK May 17 00:40:53.432346 ignition[1214]: INFO : mount: mount passed May 17 00:40:53.432943 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:40:53.435271 ignition[1214]: INFO : Ignition finished successfully May 17 00:40:53.437244 systemd[1]: Finished ignition-mount.service. May 17 00:40:53.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:53.451872 systemd[1]: Finished sysroot-boot.service. May 17 00:40:53.458976 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1220) May 17 00:40:53.459002 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:40:53.459015 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:40:53.459026 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:40:53.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:53.480401 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:40:53.492302 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:40:53.493764 systemd[1]: Starting ignition-files.service... May 17 00:40:53.510075 ignition[1243]: INFO : Ignition 2.14.0 May 17 00:40:53.510075 ignition[1243]: INFO : Stage: files May 17 00:40:53.511416 ignition[1243]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:40:53.511416 ignition[1243]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:40:53.516635 ignition[1243]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:40:53.517342 ignition[1243]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:40:53.518100 ignition[1243]: INFO : PUT result: OK May 17 00:40:53.522959 ignition[1243]: DEBUG : files: compiled without relabeling support, skipping May 17 00:40:53.528972 ignition[1243]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:40:53.528972 ignition[1243]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:40:53.542981 ignition[1243]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:40:53.544169 ignition[1243]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:40:53.546145 unknown[1243]: wrote ssh authorized keys file for user: core May 17 00:40:53.547164 ignition[1243]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:40:53.548694 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" May 17 00:40:53.549975 ignition[1243]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:40:53.553219 ignition[1243]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1727566760" May 17 00:40:53.554599 ignition[1243]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1727566760": device or resource busy May 17 00:40:53.554599 ignition[1243]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1727566760", trying btrfs: device or resource busy May 17 00:40:53.554599 ignition[1243]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1727566760" May 17 00:40:53.559441 ignition[1243]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1727566760" May 17 00:40:53.569293 ignition[1243]: INFO : op(3): [started] unmounting "/mnt/oem1727566760" May 17 00:40:53.571049 ignition[1243]: INFO : op(3): [finished] unmounting "/mnt/oem1727566760" May 17 00:40:53.571049 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" May 17 00:40:53.571049 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:40:53.571049 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:40:53.579336 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:40:53.579336 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:40:53.579336 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:40:53.579336 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:40:53.579336 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 17 00:40:53.579336 ignition[1243]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:40:53.571093 systemd[1]: mnt-oem1727566760.mount: Deactivated successfully. May 17 00:40:53.597747 ignition[1243]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem659895312" May 17 00:40:53.597747 ignition[1243]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem659895312": device or resource busy May 17 00:40:53.597747 ignition[1243]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem659895312", trying btrfs: device or resource busy May 17 00:40:53.597747 ignition[1243]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem659895312" May 17 00:40:53.597747 ignition[1243]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem659895312" May 17 00:40:53.597747 ignition[1243]: INFO : op(6): [started] unmounting "/mnt/oem659895312" May 17 00:40:53.597747 ignition[1243]: INFO : op(6): [finished] unmounting "/mnt/oem659895312" May 17 00:40:53.597747 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 17 00:40:53.597747 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 17 00:40:53.597747 ignition[1243]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:40:53.597747 ignition[1243]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem748648" May 17 00:40:53.597747 ignition[1243]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem748648": device or resource busy May 17 00:40:53.597747 ignition[1243]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem748648", trying btrfs: device or resource busy May 17 00:40:53.597747 ignition[1243]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem748648" May 17 00:40:53.597747 ignition[1243]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem748648" May 17 00:40:53.597747 ignition[1243]: INFO : op(9): [started] unmounting "/mnt/oem748648" May 17 00:40:53.597747 ignition[1243]: INFO : op(9): [finished] unmounting "/mnt/oem748648" May 17 00:40:53.597747 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 17 00:40:53.597747 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:40:53.597747 ignition[1243]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:40:53.630111 ignition[1243]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem76367991" May 17 00:40:53.630111 ignition[1243]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem76367991": device or resource busy May 17 00:40:53.630111 ignition[1243]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem76367991", trying btrfs: device or resource busy May 17 00:40:53.630111 ignition[1243]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem76367991" May 17 00:40:53.630111 ignition[1243]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem76367991" May 17 00:40:53.630111 ignition[1243]: INFO : op(c): [started] unmounting "/mnt/oem76367991" May 17 00:40:53.630111 ignition[1243]: INFO : op(c): [finished] unmounting "/mnt/oem76367991" May 17 00:40:53.630111 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:40:53.630111 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:40:53.630111 ignition[1243]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 May 17 00:40:53.731549 systemd-networkd[1107]: eth0: Gained IPv6LL May 17 00:40:54.361001 ignition[1243]: INFO : GET result: OK May 17 00:40:54.705171 ignition[1243]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:40:54.705171 ignition[1243]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 17 00:40:54.705171 ignition[1243]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 17 00:40:54.705171 ignition[1243]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" May 17 00:40:54.705171 ignition[1243]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 17 00:40:54.713016 ignition[1243]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 17 00:40:54.713016 ignition[1243]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" May 17 00:40:54.713016 ignition[1243]: INFO : files: op(e): [started] processing unit "nvidia.service" May 17 00:40:54.713016 ignition[1243]: INFO : files: op(e): [finished] processing unit "nvidia.service" May 17 00:40:54.713016 ignition[1243]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:40:54.713016 ignition[1243]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:40:54.713016 ignition[1243]: INFO : files: op(10): [started] setting preset to enabled for "amazon-ssm-agent.service" May 17 00:40:54.713016 ignition[1243]: INFO : files: op(10): [finished] setting preset to enabled for "amazon-ssm-agent.service" May 17 00:40:54.713016 ignition[1243]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" May 17 00:40:54.713016 ignition[1243]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" May 17 00:40:54.713016 ignition[1243]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:40:54.713016 ignition[1243]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:40:54.713016 ignition[1243]: INFO : files: files passed May 17 00:40:54.713016 ignition[1243]: INFO : Ignition finished successfully May 17 00:40:54.756151 kernel: kauditd_printk_skb: 26 callbacks suppressed May 17 00:40:54.756176 kernel: audit: type=1130 audit(1747442454.711:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.756195 kernel: audit: type=1130 audit(1747442454.730:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.756208 kernel: audit: type=1130 audit(1747442454.739:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.756219 kernel: audit: type=1131 audit(1747442454.743:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.710853 systemd[1]: Finished ignition-files.service. May 17 00:40:54.717610 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:40:54.724264 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:40:54.759360 initrd-setup-root-after-ignition[1266]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:40:54.725908 systemd[1]: Starting ignition-quench.service... May 17 00:40:54.771666 kernel: audit: type=1130 audit(1747442454.761:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.771693 kernel: audit: type=1131 audit(1747442454.761:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.727144 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:40:54.730584 systemd[1]: Reached target ignition-complete.target. May 17 00:40:54.737960 systemd[1]: Starting initrd-parse-etc.service... May 17 00:40:54.739177 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:40:54.739260 systemd[1]: Finished ignition-quench.service. May 17 00:40:54.759333 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:40:54.759488 systemd[1]: Finished initrd-parse-etc.service. May 17 00:40:54.761605 systemd[1]: Reached target initrd-fs.target. May 17 00:40:54.772300 systemd[1]: Reached target initrd.target. May 17 00:40:54.773635 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:40:54.774613 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:40:54.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.785767 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:40:54.791831 kernel: audit: type=1130 audit(1747442454.785:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.792005 systemd[1]: Starting initrd-cleanup.service... May 17 00:40:54.801131 systemd[1]: Stopped target nss-lookup.target. May 17 00:40:54.802615 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:40:54.803926 systemd[1]: Stopped target timers.target. May 17 00:40:54.805186 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:40:54.805558 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:40:54.811546 kernel: audit: type=1131 audit(1747442454.806:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.806629 systemd[1]: Stopped target initrd.target. May 17 00:40:54.812161 systemd[1]: Stopped target basic.target. May 17 00:40:54.813305 systemd[1]: Stopped target ignition-complete.target. May 17 00:40:54.814435 systemd[1]: Stopped target ignition-diskful.target. May 17 00:40:54.815449 systemd[1]: Stopped target initrd-root-device.target. May 17 00:40:54.816485 systemd[1]: Stopped target remote-fs.target. May 17 00:40:54.817542 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:40:54.818672 systemd[1]: Stopped target sysinit.target. May 17 00:40:54.819755 systemd[1]: Stopped target local-fs.target. May 17 00:40:54.820823 systemd[1]: Stopped target local-fs-pre.target. May 17 00:40:54.821905 systemd[1]: Stopped target swap.target. May 17 00:40:54.822912 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:40:54.828886 kernel: audit: type=1131 audit(1747442454.823:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.823048 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:40:54.824028 systemd[1]: Stopped target cryptsetup.target. May 17 00:40:54.835616 kernel: audit: type=1131 audit(1747442454.830:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.829528 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:40:54.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.829673 systemd[1]: Stopped dracut-initqueue.service. May 17 00:40:54.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.830760 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:40:54.830884 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:40:54.836328 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:40:54.836474 systemd[1]: Stopped ignition-files.service. May 17 00:40:54.838299 systemd[1]: Stopping ignition-mount.service... May 17 00:40:54.839034 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:40:54.839193 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:40:54.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.844345 systemd[1]: Stopping sysroot-boot.service... May 17 00:40:54.845563 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:40:54.846364 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:40:54.847396 ignition[1281]: INFO : Ignition 2.14.0 May 17 00:40:54.847396 ignition[1281]: INFO : Stage: umount May 17 00:40:54.848723 ignition[1281]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:40:54.848723 ignition[1281]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:40:54.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.851150 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:40:54.851998 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:40:54.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.854330 ignition[1281]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:40:54.854995 ignition[1281]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:40:54.857028 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:40:54.857757 systemd[1]: Finished initrd-cleanup.service. May 17 00:40:54.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.860354 ignition[1281]: INFO : PUT result: OK May 17 00:40:54.862165 ignition[1281]: INFO : umount: umount passed May 17 00:40:54.862165 ignition[1281]: INFO : Ignition finished successfully May 17 00:40:54.864070 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:40:54.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.864157 systemd[1]: Stopped ignition-mount.service. May 17 00:40:54.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.865416 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:40:54.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.865459 systemd[1]: Stopped ignition-disks.service. May 17 00:40:54.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.866486 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:40:54.866531 systemd[1]: Stopped ignition-kargs.service. May 17 00:40:54.867293 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:40:54.867329 systemd[1]: Stopped ignition-fetch.service. May 17 00:40:54.868392 systemd[1]: Stopped target network.target. May 17 00:40:54.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.871781 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:40:54.871825 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:40:54.872884 systemd[1]: Stopped target paths.target. May 17 00:40:54.873906 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:40:54.877425 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:40:54.878074 systemd[1]: Stopped target slices.target. May 17 00:40:54.880055 systemd[1]: Stopped target sockets.target. May 17 00:40:54.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.882500 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:40:54.882533 systemd[1]: Closed iscsid.socket. May 17 00:40:54.883080 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:40:54.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.883105 systemd[1]: Closed iscsiuio.socket. May 17 00:40:54.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.883624 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:40:54.883669 systemd[1]: Stopped ignition-setup.service. May 17 00:40:54.893000 audit: BPF prog-id=6 op=UNLOAD May 17 00:40:54.884329 systemd[1]: Stopping systemd-networkd.service... May 17 00:40:54.885133 systemd[1]: Stopping systemd-resolved.service... May 17 00:40:54.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.888453 systemd-networkd[1107]: eth0: DHCPv6 lease lost May 17 00:40:54.895000 audit: BPF prog-id=9 op=UNLOAD May 17 00:40:54.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.888533 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:40:54.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.889050 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:40:54.889136 systemd[1]: Stopped systemd-resolved.service. May 17 00:40:54.890315 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:40:54.890418 systemd[1]: Stopped systemd-networkd.service. May 17 00:40:54.891318 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:40:54.891347 systemd[1]: Closed systemd-networkd.socket. May 17 00:40:54.892725 systemd[1]: Stopping network-cleanup.service... May 17 00:40:54.894670 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:40:54.894726 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:40:54.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.895680 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:40:54.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.895719 systemd[1]: Stopped systemd-sysctl.service. May 17 00:40:54.896674 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:40:54.896729 systemd[1]: Stopped systemd-modules-load.service. May 17 00:40:54.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.897669 systemd[1]: Stopping systemd-udevd.service... May 17 00:40:54.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.902460 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:40:54.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.905193 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:40:54.906949 systemd[1]: Stopped systemd-udevd.service. May 17 00:40:54.908311 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:40:54.908426 systemd[1]: Stopped network-cleanup.service. May 17 00:40:54.909136 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:40:54.909173 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:40:54.910320 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:40:54.910352 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:40:54.911320 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:40:54.911360 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:40:54.912432 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:40:54.912468 systemd[1]: Stopped dracut-cmdline.service. May 17 00:40:54.913397 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:40:54.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.913433 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:40:54.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:54.915296 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:40:54.922625 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:40:54.922688 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:40:54.924089 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:40:54.924175 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:40:55.011877 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:40:55.011981 systemd[1]: Stopped sysroot-boot.service. May 17 00:40:55.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:55.013266 systemd[1]: Reached target initrd-switch-root.target. May 17 00:40:55.014212 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:40:55.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:55.014267 systemd[1]: Stopped initrd-setup-root.service. May 17 00:40:55.016056 systemd[1]: Starting initrd-switch-root.service... May 17 00:40:55.027735 systemd[1]: Switching root. May 17 00:40:55.048921 iscsid[1112]: iscsid shutting down. May 17 00:40:55.049571 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 17 00:40:55.049630 systemd-journald[185]: Journal stopped May 17 00:40:58.765176 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:40:58.765256 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:40:58.765274 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:40:58.765293 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:40:58.765310 kernel: SELinux: policy capability open_perms=1 May 17 00:40:58.765327 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:40:58.765349 kernel: SELinux: policy capability always_check_network=0 May 17 00:40:58.765372 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:40:58.769497 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:40:58.769520 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:40:58.769537 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:40:58.769556 systemd[1]: Successfully loaded SELinux policy in 55.514ms. May 17 00:40:58.769598 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.017ms. May 17 00:40:58.769621 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:40:58.769644 systemd[1]: Detected virtualization amazon. May 17 00:40:58.769663 systemd[1]: Detected architecture x86-64. May 17 00:40:58.769680 systemd[1]: Detected first boot. May 17 00:40:58.769706 systemd[1]: Initializing machine ID from VM UUID. May 17 00:40:58.769724 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:40:58.769741 systemd[1]: Populated /etc with preset unit settings. May 17 00:40:58.769760 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:40:58.769785 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:40:58.769809 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:40:58.769829 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:40:58.769846 systemd[1]: Stopped iscsiuio.service. May 17 00:40:58.769864 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:40:58.769882 systemd[1]: Stopped iscsid.service. May 17 00:40:58.769899 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:40:58.769918 systemd[1]: Stopped initrd-switch-root.service. May 17 00:40:58.769935 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:40:58.769957 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:40:58.769975 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:40:58.769993 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 17 00:40:58.770011 systemd[1]: Created slice system-getty.slice. May 17 00:40:58.770030 systemd[1]: Created slice system-modprobe.slice. May 17 00:40:58.770048 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:40:58.770066 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:40:58.770083 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:40:58.770101 systemd[1]: Created slice user.slice. May 17 00:40:58.770121 systemd[1]: Started systemd-ask-password-console.path. May 17 00:40:58.770142 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:40:58.770159 systemd[1]: Set up automount boot.automount. May 17 00:40:58.770177 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:40:58.770195 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:40:58.770212 systemd[1]: Stopped target initrd-fs.target. May 17 00:40:58.770230 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:40:58.774567 systemd[1]: Reached target integritysetup.target. May 17 00:40:58.774618 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:40:58.774639 systemd[1]: Reached target remote-fs.target. May 17 00:40:58.774661 systemd[1]: Reached target slices.target. May 17 00:40:58.774681 systemd[1]: Reached target swap.target. May 17 00:40:58.774702 systemd[1]: Reached target torcx.target. May 17 00:40:58.774723 systemd[1]: Reached target veritysetup.target. May 17 00:40:58.774743 systemd[1]: Listening on systemd-coredump.socket. May 17 00:40:58.774764 systemd[1]: Listening on systemd-initctl.socket. May 17 00:40:58.774785 systemd[1]: Listening on systemd-networkd.socket. May 17 00:40:58.774813 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:40:58.774834 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:40:58.774852 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:40:58.774870 systemd[1]: Mounting dev-hugepages.mount... May 17 00:40:58.774889 systemd[1]: Mounting dev-mqueue.mount... May 17 00:40:58.774908 systemd[1]: Mounting media.mount... May 17 00:40:58.774926 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:40:58.774948 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:40:58.774966 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:40:58.774987 systemd[1]: Mounting tmp.mount... May 17 00:40:58.775005 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:40:58.775023 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:40:58.775041 systemd[1]: Starting kmod-static-nodes.service... May 17 00:40:58.775059 systemd[1]: Starting modprobe@configfs.service... May 17 00:40:58.775078 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:40:58.775097 systemd[1]: Starting modprobe@drm.service... May 17 00:40:58.775115 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:40:58.775133 systemd[1]: Starting modprobe@fuse.service... May 17 00:40:58.775153 systemd[1]: Starting modprobe@loop.service... May 17 00:40:58.775171 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:40:58.775189 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:40:58.775206 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:40:58.775224 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:40:58.775242 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:40:58.775260 systemd[1]: Stopped systemd-journald.service. May 17 00:40:58.775277 systemd[1]: Starting systemd-journald.service... May 17 00:40:58.775295 systemd[1]: Starting systemd-modules-load.service... May 17 00:40:58.775315 systemd[1]: Starting systemd-network-generator.service... May 17 00:40:58.775333 systemd[1]: Starting systemd-remount-fs.service... May 17 00:40:58.775350 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:40:58.775393 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:40:58.775411 kernel: loop: module loaded May 17 00:40:58.775433 systemd[1]: Stopped verity-setup.service. May 17 00:40:58.775451 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:40:58.775470 kernel: fuse: init (API version 7.34) May 17 00:40:58.775488 systemd[1]: Mounted dev-hugepages.mount. May 17 00:40:58.775506 systemd[1]: Mounted dev-mqueue.mount. May 17 00:40:58.775525 systemd[1]: Mounted media.mount. May 17 00:40:58.775543 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:40:58.775562 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:40:58.775583 systemd[1]: Mounted tmp.mount. May 17 00:40:58.775602 systemd[1]: Finished kmod-static-nodes.service. May 17 00:40:58.775621 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:40:58.775640 systemd[1]: Finished modprobe@configfs.service. May 17 00:40:58.775658 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:40:58.775676 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:40:58.775696 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:40:58.775715 systemd[1]: Finished modprobe@drm.service. May 17 00:40:58.775733 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:40:58.778430 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:40:58.778473 systemd-journald[1393]: Journal started May 17 00:40:58.778551 systemd-journald[1393]: Runtime Journal (/run/log/journal/ec23ec3ab38c06099418f5709e32eddf) is 4.8M, max 38.3M, 33.5M free. May 17 00:40:55.490000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:40:55.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:40:55.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:40:55.591000 audit: BPF prog-id=10 op=LOAD May 17 00:40:55.591000 audit: BPF prog-id=10 op=UNLOAD May 17 00:40:55.591000 audit: BPF prog-id=11 op=LOAD May 17 00:40:55.591000 audit: BPF prog-id=11 op=UNLOAD May 17 00:40:55.729000 audit[1314]: AVC avc: denied { associate } for pid=1314 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:40:55.729000 audit[1314]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1297 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:55.729000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:40:55.733000 audit[1314]: AVC avc: denied { associate } for pid=1314 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:40:55.733000 audit[1314]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=1297 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:55.733000 audit: CWD cwd="/" May 17 00:40:55.733000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:55.733000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:55.733000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:40:58.501000 audit: BPF prog-id=12 op=LOAD May 17 00:40:58.501000 audit: BPF prog-id=3 op=UNLOAD May 17 00:40:58.501000 audit: BPF prog-id=13 op=LOAD May 17 00:40:58.501000 audit: BPF prog-id=14 op=LOAD May 17 00:40:58.501000 audit: BPF prog-id=4 op=UNLOAD May 17 00:40:58.501000 audit: BPF prog-id=5 op=UNLOAD May 17 00:40:58.502000 audit: BPF prog-id=15 op=LOAD May 17 00:40:58.502000 audit: BPF prog-id=12 op=UNLOAD May 17 00:40:58.502000 audit: BPF prog-id=16 op=LOAD May 17 00:40:58.502000 audit: BPF prog-id=17 op=LOAD May 17 00:40:58.503000 audit: BPF prog-id=13 op=UNLOAD May 17 00:40:58.503000 audit: BPF prog-id=14 op=UNLOAD May 17 00:40:58.503000 audit: BPF prog-id=18 op=LOAD May 17 00:40:58.503000 audit: BPF prog-id=15 op=UNLOAD May 17 00:40:58.504000 audit: BPF prog-id=19 op=LOAD May 17 00:40:58.504000 audit: BPF prog-id=20 op=LOAD May 17 00:40:58.504000 audit: BPF prog-id=16 op=UNLOAD May 17 00:40:58.504000 audit: BPF prog-id=17 op=UNLOAD May 17 00:40:58.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.515000 audit: BPF prog-id=18 op=UNLOAD May 17 00:40:58.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.781955 systemd[1]: Started systemd-journald.service. May 17 00:40:58.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.671000 audit: BPF prog-id=21 op=LOAD May 17 00:40:58.671000 audit: BPF prog-id=22 op=LOAD May 17 00:40:58.671000 audit: BPF prog-id=23 op=LOAD May 17 00:40:58.671000 audit: BPF prog-id=19 op=UNLOAD May 17 00:40:58.671000 audit: BPF prog-id=20 op=UNLOAD May 17 00:40:58.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.762000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:40:58.762000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff0b8d7650 a2=4000 a3=7fff0b8d76ec items=0 ppid=1 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:58.762000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:40:58.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.500367 systemd[1]: Queued start job for default target multi-user.target. May 17 00:40:55.712347 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:40:58.500392 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. May 17 00:40:55.713304 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:40:58.505841 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:40:55.713333 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:40:58.781800 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:40:55.713394 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:40:58.783519 systemd[1]: Finished modprobe@fuse.service. May 17 00:40:55.713412 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:40:58.784744 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:40:55.713457 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:40:58.784904 systemd[1]: Finished modprobe@loop.service. May 17 00:40:55.713476 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:40:58.786316 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:40:58.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:55.713808 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:40:55.713867 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:40:55.713888 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:40:55.715371 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:40:55.715440 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:40:58.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:55.715469 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:40:55.715492 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:40:55.715519 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:40:55.715540 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:40:58.044579 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:58Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:40:58.787915 systemd[1]: Finished systemd-modules-load.service. May 17 00:40:58.044823 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:58Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:40:58.044936 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:58Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:40:58.045120 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:58Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:40:58.045169 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:58Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:40:58.045225 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-17T00:40:58Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:40:58.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.789449 systemd[1]: Finished systemd-network-generator.service. May 17 00:40:58.791108 systemd[1]: Finished systemd-remount-fs.service. May 17 00:40:58.792790 systemd[1]: Reached target network-pre.target. May 17 00:40:58.795734 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:40:58.799035 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:40:58.804245 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:40:58.807268 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:40:58.810115 systemd[1]: Starting systemd-journal-flush.service... May 17 00:40:58.812044 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:40:58.813682 systemd[1]: Starting systemd-random-seed.service... May 17 00:40:58.815473 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:40:58.816981 systemd[1]: Starting systemd-sysctl.service... May 17 00:40:58.820508 systemd[1]: Starting systemd-sysusers.service... May 17 00:40:58.826358 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:40:58.827774 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:40:58.834051 systemd-journald[1393]: Time spent on flushing to /var/log/journal/ec23ec3ab38c06099418f5709e32eddf is 60.686ms for 1194 entries. May 17 00:40:58.834051 systemd-journald[1393]: System Journal (/var/log/journal/ec23ec3ab38c06099418f5709e32eddf) is 8.0M, max 195.6M, 187.6M free. May 17 00:40:58.903991 systemd-journald[1393]: Received client request to flush runtime journal. May 17 00:40:58.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.838577 systemd[1]: Finished systemd-random-seed.service. May 17 00:40:58.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.839489 systemd[1]: Reached target first-boot-complete.target. May 17 00:40:58.862700 systemd[1]: Finished systemd-sysctl.service. May 17 00:40:58.888589 systemd[1]: Finished systemd-sysusers.service. May 17 00:40:58.895050 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:40:58.897365 systemd[1]: Starting systemd-udev-settle.service... May 17 00:40:58.905074 systemd[1]: Finished systemd-journal-flush.service. May 17 00:40:58.912864 udevadm[1432]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:40:59.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:59.495865 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:40:59.496000 audit: BPF prog-id=24 op=LOAD May 17 00:40:59.496000 audit: BPF prog-id=25 op=LOAD May 17 00:40:59.496000 audit: BPF prog-id=7 op=UNLOAD May 17 00:40:59.496000 audit: BPF prog-id=8 op=UNLOAD May 17 00:40:59.497601 systemd[1]: Starting systemd-udevd.service... May 17 00:40:59.515498 systemd-udevd[1434]: Using default interface naming scheme 'v252'. May 17 00:40:59.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:59.565000 audit: BPF prog-id=26 op=LOAD May 17 00:40:59.564165 systemd[1]: Started systemd-udevd.service. May 17 00:40:59.566430 systemd[1]: Starting systemd-networkd.service... May 17 00:40:59.577000 audit: BPF prog-id=27 op=LOAD May 17 00:40:59.577000 audit: BPF prog-id=28 op=LOAD May 17 00:40:59.577000 audit: BPF prog-id=29 op=LOAD May 17 00:40:59.578985 systemd[1]: Starting systemd-userdbd.service... May 17 00:40:59.611190 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:40:59.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:59.624048 systemd[1]: Started systemd-userdbd.service. May 17 00:40:59.636146 (udev-worker)[1436]: Network interface NamePolicy= disabled on kernel command line. May 17 00:40:59.670410 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:40:59.675715 kernel: ACPI: button: Power Button [PWRF] May 17 00:40:59.679409 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 May 17 00:40:59.681410 kernel: ACPI: button: Sleep Button [SLPF] May 17 00:40:59.677000 audit[1446]: AVC avc: denied { confidentiality } for pid=1446 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:40:59.677000 audit[1446]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559a49985c20 a1=338ac a2=7f1992b98bc5 a3=5 items=110 ppid=1434 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:59.677000 audit: CWD cwd="/" May 17 00:40:59.677000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=1 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=2 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=3 name=(null) inode=14569 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=4 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=5 name=(null) inode=14570 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=6 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=7 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=8 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=9 name=(null) inode=14572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=10 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=11 name=(null) inode=14573 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=12 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=13 name=(null) inode=14574 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=14 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=15 name=(null) inode=14575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=16 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=17 name=(null) inode=14576 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=18 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=19 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=20 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=21 name=(null) inode=14578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=22 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=23 name=(null) inode=14579 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=24 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=25 name=(null) inode=14580 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=26 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=27 name=(null) inode=14581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=28 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=29 name=(null) inode=14582 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=30 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=31 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=32 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=33 name=(null) inode=14584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=34 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=35 name=(null) inode=14585 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=36 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=37 name=(null) inode=14586 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=38 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=39 name=(null) inode=14587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=40 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=41 name=(null) inode=14588 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=42 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=43 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=44 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=45 name=(null) inode=14590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=46 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=47 name=(null) inode=14591 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=48 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=49 name=(null) inode=14592 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=50 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=51 name=(null) inode=14593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=52 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=53 name=(null) inode=14594 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=55 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=56 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=57 name=(null) inode=14596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=58 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=59 name=(null) inode=14597 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=60 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=61 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=62 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=63 name=(null) inode=14599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=64 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=65 name=(null) inode=14600 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=66 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=67 name=(null) inode=14601 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=68 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=69 name=(null) inode=14602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=70 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=71 name=(null) inode=14603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=72 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=73 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=74 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=75 name=(null) inode=14605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=76 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=77 name=(null) inode=14606 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=78 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=79 name=(null) inode=14607 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=80 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=81 name=(null) inode=14608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=82 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=83 name=(null) inode=14609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=84 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=85 name=(null) inode=14610 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=86 name=(null) inode=14610 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=87 name=(null) inode=14611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=88 name=(null) inode=14610 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=89 name=(null) inode=14612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=90 name=(null) inode=14610 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=91 name=(null) inode=14613 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=92 name=(null) inode=14610 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=93 name=(null) inode=14614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=94 name=(null) inode=14610 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=95 name=(null) inode=14615 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=96 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=97 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=98 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=99 name=(null) inode=14617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=100 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=101 name=(null) inode=14618 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=102 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=103 name=(null) inode=14619 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=104 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=105 name=(null) inode=14620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=106 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=107 name=(null) inode=14621 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PATH item=109 name=(null) inode=14622 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:59.677000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:40:59.706225 systemd-networkd[1442]: lo: Link UP May 17 00:40:59.706239 systemd-networkd[1442]: lo: Gained carrier May 17 00:40:59.706692 systemd-networkd[1442]: Enumeration completed May 17 00:40:59.706792 systemd[1]: Started systemd-networkd.service. May 17 00:40:59.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:59.708400 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:40:59.709320 systemd-networkd[1442]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:40:59.712871 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 17 00:40:59.716041 systemd-networkd[1442]: eth0: Link UP May 17 00:40:59.716481 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:40:59.716182 systemd-networkd[1442]: eth0: Gained carrier May 17 00:40:59.723413 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 May 17 00:40:59.725571 systemd-networkd[1442]: eth0: DHCPv4 address 172.31.31.18/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 17 00:40:59.754407 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:40:59.821995 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:40:59.826041 systemd[1]: Finished systemd-udev-settle.service. May 17 00:40:59.828419 kernel: kauditd_printk_skb: 232 callbacks suppressed May 17 00:40:59.828525 kernel: audit: type=1130 audit(1747442459.826:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:59.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:59.827982 systemd[1]: Starting lvm2-activation-early.service... May 17 00:40:59.861853 lvm[1548]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:40:59.888647 systemd[1]: Finished lvm2-activation-early.service. May 17 00:40:59.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:59.889310 systemd[1]: Reached target cryptsetup.target. May 17 00:40:59.894417 kernel: audit: type=1130 audit(1747442459.888:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:59.895950 systemd[1]: Starting lvm2-activation.service... May 17 00:40:59.900684 lvm[1549]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:40:59.924679 systemd[1]: Finished lvm2-activation.service. May 17 00:40:59.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:59.925397 systemd[1]: Reached target local-fs-pre.target. May 17 00:40:59.930418 kernel: audit: type=1130 audit(1747442459.924:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:59.930741 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:40:59.930775 systemd[1]: Reached target local-fs.target. May 17 00:40:59.931336 systemd[1]: Reached target machines.target. May 17 00:40:59.933076 systemd[1]: Starting ldconfig.service... May 17 00:40:59.934678 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:40:59.934746 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:40:59.935897 systemd[1]: Starting systemd-boot-update.service... May 17 00:40:59.937898 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:40:59.940496 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:40:59.943083 systemd[1]: Starting systemd-sysext.service... May 17 00:40:59.947920 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1551 (bootctl) May 17 00:40:59.949337 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:40:59.967263 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:40:59.974136 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:40:59.974364 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:40:59.993298 kernel: loop0: detected capacity change from 0 to 224512 May 17 00:40:59.993422 kernel: audit: type=1130 audit(1747442459.992:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:59.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:59.991941 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:41:00.097628 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:41:00.098318 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:41:00.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.104449 kernel: audit: type=1130 audit(1747442460.098:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.132544 systemd-fsck[1562]: fsck.fat 4.2 (2021-01-31) May 17 00:41:00.132544 systemd-fsck[1562]: /dev/nvme0n1p1: 790 files, 120726/258078 clusters May 17 00:41:00.131146 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:41:00.138801 kernel: audit: type=1130 audit(1747442460.131:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.138095 systemd[1]: Mounting boot.mount... May 17 00:41:00.142403 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:41:00.159414 kernel: loop1: detected capacity change from 0 to 224512 May 17 00:41:00.160469 systemd[1]: Mounted boot.mount. May 17 00:41:00.186724 (sd-sysext)[1567]: Using extensions 'kubernetes'. May 17 00:41:00.187128 (sd-sysext)[1567]: Merged extensions into '/usr'. May 17 00:41:00.188485 systemd[1]: Finished systemd-boot-update.service. May 17 00:41:00.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.195498 kernel: audit: type=1130 audit(1747442460.188:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.209863 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:00.211923 systemd[1]: Mounting usr-share-oem.mount... May 17 00:41:00.214136 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:41:00.216262 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:41:00.221573 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:41:00.224295 systemd[1]: Starting modprobe@loop.service... May 17 00:41:00.225409 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:41:00.225611 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:00.225811 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:00.229453 systemd[1]: Mounted usr-share-oem.mount. May 17 00:41:00.230609 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:41:00.230788 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:41:00.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.237075 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:41:00.237247 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:41:00.242140 kernel: audit: type=1130 audit(1747442460.231:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.242533 kernel: audit: type=1131 audit(1747442460.236:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.243717 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:41:00.243888 systemd[1]: Finished modprobe@loop.service. May 17 00:41:00.249423 kernel: audit: type=1130 audit(1747442460.242:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.250900 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:41:00.251068 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:41:00.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.252499 systemd[1]: Finished systemd-sysext.service. May 17 00:41:00.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.257634 systemd[1]: Starting ensure-sysext.service... May 17 00:41:00.260492 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:41:00.269317 systemd[1]: Reloading. May 17 00:41:00.305759 systemd-tmpfiles[1585]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:41:00.315790 systemd-tmpfiles[1585]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:41:00.331066 systemd-tmpfiles[1585]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:41:00.378191 /usr/lib/systemd/system-generators/torcx-generator[1605]: time="2025-05-17T00:41:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:41:00.378703 /usr/lib/systemd/system-generators/torcx-generator[1605]: time="2025-05-17T00:41:00Z" level=info msg="torcx already run" May 17 00:41:00.567124 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:41:00.568349 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:41:00.620426 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:41:00.764000 audit: BPF prog-id=30 op=LOAD May 17 00:41:00.764000 audit: BPF prog-id=21 op=UNLOAD May 17 00:41:00.765000 audit: BPF prog-id=31 op=LOAD May 17 00:41:00.765000 audit: BPF prog-id=32 op=LOAD May 17 00:41:00.765000 audit: BPF prog-id=22 op=UNLOAD May 17 00:41:00.765000 audit: BPF prog-id=23 op=UNLOAD May 17 00:41:00.766000 audit: BPF prog-id=33 op=LOAD May 17 00:41:00.766000 audit: BPF prog-id=34 op=LOAD May 17 00:41:00.766000 audit: BPF prog-id=24 op=UNLOAD May 17 00:41:00.766000 audit: BPF prog-id=25 op=UNLOAD May 17 00:41:00.767000 audit: BPF prog-id=35 op=LOAD May 17 00:41:00.767000 audit: BPF prog-id=27 op=UNLOAD May 17 00:41:00.767000 audit: BPF prog-id=36 op=LOAD May 17 00:41:00.767000 audit: BPF prog-id=37 op=LOAD May 17 00:41:00.767000 audit: BPF prog-id=28 op=UNLOAD May 17 00:41:00.767000 audit: BPF prog-id=29 op=UNLOAD May 17 00:41:00.768000 audit: BPF prog-id=38 op=LOAD May 17 00:41:00.768000 audit: BPF prog-id=26 op=UNLOAD May 17 00:41:00.776755 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:41:00.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.783899 systemd[1]: Starting audit-rules.service... May 17 00:41:00.787866 systemd[1]: Starting clean-ca-certificates.service... May 17 00:41:00.791913 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:41:00.803000 audit: BPF prog-id=39 op=LOAD May 17 00:41:00.819819 systemd[1]: Starting systemd-resolved.service... May 17 00:41:00.822000 audit: BPF prog-id=40 op=LOAD May 17 00:41:00.827658 systemd[1]: Starting systemd-timesyncd.service... May 17 00:41:00.844158 systemd[1]: Starting systemd-update-utmp.service... May 17 00:41:00.873404 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:41:00.883898 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:41:00.886951 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:41:00.902930 systemd[1]: Starting modprobe@loop.service... May 17 00:41:00.905611 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:41:00.907264 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:00.926000 audit[1669]: SYSTEM_BOOT pid=1669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:41:00.930736 systemd[1]: Finished clean-ca-certificates.service. May 17 00:41:00.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.934621 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:41:00.934808 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:41:00.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.941336 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:41:00.941594 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:41:00.961538 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:41:00.965029 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:41:00.966531 ldconfig[1550]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:41:00.966569 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:41:00.966867 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:00.967153 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:41:00.968705 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:41:00.968910 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:41:00.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.995903 systemd[1]: Finished ldconfig.service. May 17 00:41:00.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.997293 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:00.997511 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:00.998340 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:41:00.998553 systemd[1]: Finished modprobe@loop.service. May 17 00:41:01.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.006647 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:41:01.006833 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:41:01.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.015640 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:01.016154 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:41:01.027234 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:41:01.047469 systemd[1]: Starting modprobe@drm.service... May 17 00:41:01.055428 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:41:01.074791 systemd[1]: Starting modprobe@loop.service... May 17 00:41:01.086220 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:41:01.086494 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:01.086735 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:41:01.086883 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:41:01.099965 systemd[1]: Finished systemd-update-utmp.service. May 17 00:41:01.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.101493 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:41:01.113708 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:41:01.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.137051 systemd[1]: Finished ensure-sysext.service. May 17 00:41:01.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.149144 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:41:01.149343 systemd[1]: Finished modprobe@drm.service. May 17 00:41:01.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.167590 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:41:01.167770 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:41:01.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.170253 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:41:01.170448 systemd[1]: Finished modprobe@loop.service. May 17 00:41:01.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.173456 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:41:01.173738 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:41:01.199194 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:41:01.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.207490 systemd[1]: Starting systemd-update-done.service... May 17 00:41:01.220093 systemd-networkd[1442]: eth0: Gained IPv6LL May 17 00:41:01.228010 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:41:01.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:01.228000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:41:01.228000 audit[1689]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe59477e10 a2=420 a3=0 items=0 ppid=1661 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:01.228000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:41:01.241577 augenrules[1689]: No rules May 17 00:41:01.242715 systemd[1]: Finished audit-rules.service. May 17 00:41:01.255716 systemd[1]: Finished systemd-update-done.service. May 17 00:41:01.290711 systemd-resolved[1665]: Positive Trust Anchors: May 17 00:41:01.290733 systemd-resolved[1665]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:41:01.290777 systemd-resolved[1665]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:41:01.312492 systemd[1]: Started systemd-timesyncd.service. May 17 00:41:01.314878 systemd[1]: Reached target time-set.target. May 17 00:41:02.301846 systemd-timesyncd[1666]: Contacted time server 205.233.73.201:123 (0.flatcar.pool.ntp.org). May 17 00:41:02.302265 systemd-timesyncd[1666]: Initial clock synchronization to Sat 2025-05-17 00:41:02.301688 UTC. May 17 00:41:02.317130 systemd-resolved[1665]: Defaulting to hostname 'linux'. May 17 00:41:02.322861 systemd[1]: Started systemd-resolved.service. May 17 00:41:02.323317 systemd[1]: Reached target network.target. May 17 00:41:02.323842 systemd[1]: Reached target network-online.target. May 17 00:41:02.327215 systemd[1]: Reached target nss-lookup.target. May 17 00:41:02.328688 systemd[1]: Reached target sysinit.target. May 17 00:41:02.330582 systemd[1]: Started motdgen.path. May 17 00:41:02.333344 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:41:02.333988 systemd[1]: Started logrotate.timer. May 17 00:41:02.336357 systemd[1]: Started mdadm.timer. May 17 00:41:02.346584 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:41:02.347291 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:41:02.347347 systemd[1]: Reached target paths.target. May 17 00:41:02.349314 systemd[1]: Reached target timers.target. May 17 00:41:02.351417 systemd[1]: Listening on dbus.socket. May 17 00:41:02.356360 systemd[1]: Starting docker.socket... May 17 00:41:02.363375 systemd[1]: Listening on sshd.socket. May 17 00:41:02.371420 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:02.379096 systemd[1]: Listening on docker.socket. May 17 00:41:02.382391 systemd[1]: Reached target sockets.target. May 17 00:41:02.383029 systemd[1]: Reached target basic.target. May 17 00:41:02.384054 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:41:02.384097 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:41:02.385673 systemd[1]: Started amazon-ssm-agent.service. May 17 00:41:02.392094 systemd[1]: Starting containerd.service... May 17 00:41:02.405494 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 17 00:41:02.410514 systemd[1]: Starting dbus.service... May 17 00:41:02.417958 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:41:02.423570 systemd[1]: Starting extend-filesystems.service... May 17 00:41:02.424231 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:41:02.427116 systemd[1]: Starting kubelet.service... May 17 00:41:02.430042 systemd[1]: Starting motdgen.service... May 17 00:41:02.435243 systemd[1]: Started nvidia.service. May 17 00:41:02.440670 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:41:02.443280 systemd[1]: Starting sshd-keygen.service... May 17 00:41:02.450684 systemd[1]: Starting systemd-logind.service... May 17 00:41:02.451335 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:41:02.451449 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:41:02.452156 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:41:02.475607 jq[1702]: false May 17 00:41:02.486253 systemd[1]: Starting update-engine.service... May 17 00:41:02.493107 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:41:02.501100 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:41:02.501358 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:41:02.544382 jq[1714]: true May 17 00:41:02.579325 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:41:02.579574 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:41:02.608675 jq[1722]: true May 17 00:41:02.638899 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:41:02.639128 systemd[1]: Finished motdgen.service. May 17 00:41:02.676757 dbus-daemon[1701]: [system] SELinux support is enabled May 17 00:41:02.676978 systemd[1]: Started dbus.service. May 17 00:41:02.680034 extend-filesystems[1703]: Found loop1 May 17 00:41:02.680799 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:41:02.680838 systemd[1]: Reached target system-config.target. May 17 00:41:02.681466 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:41:02.681503 systemd[1]: Reached target user-config.target. May 17 00:41:02.691505 dbus-daemon[1701]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1442 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 17 00:41:02.692022 extend-filesystems[1703]: Found nvme0n1 May 17 00:41:02.701872 systemd[1]: Starting systemd-hostnamed.service... May 17 00:41:02.711450 extend-filesystems[1703]: Found nvme0n1p1 May 17 00:41:02.711450 extend-filesystems[1703]: Found nvme0n1p2 May 17 00:41:02.711450 extend-filesystems[1703]: Found nvme0n1p3 May 17 00:41:02.711450 extend-filesystems[1703]: Found usr May 17 00:41:02.711450 extend-filesystems[1703]: Found nvme0n1p4 May 17 00:41:02.711450 extend-filesystems[1703]: Found nvme0n1p6 May 17 00:41:02.711450 extend-filesystems[1703]: Found nvme0n1p7 May 17 00:41:02.711450 extend-filesystems[1703]: Found nvme0n1p9 May 17 00:41:02.711450 extend-filesystems[1703]: Checking size of /dev/nvme0n1p9 May 17 00:41:02.760575 extend-filesystems[1703]: Resized partition /dev/nvme0n1p9 May 17 00:41:02.773216 amazon-ssm-agent[1698]: 2025/05/17 00:41:02 Failed to load instance info from vault. RegistrationKey does not exist. May 17 00:41:02.781258 extend-filesystems[1761]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:41:02.792472 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks May 17 00:41:02.814942 amazon-ssm-agent[1698]: Initializing new seelog logger May 17 00:41:02.815085 amazon-ssm-agent[1698]: New Seelog Logger Creation Complete May 17 00:41:02.815085 amazon-ssm-agent[1698]: 2025/05/17 00:41:02 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. May 17 00:41:02.815085 amazon-ssm-agent[1698]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. May 17 00:41:02.815446 amazon-ssm-agent[1698]: 2025/05/17 00:41:02 processing appconfig overrides May 17 00:41:02.890083 update_engine[1710]: I0517 00:41:02.821295 1710 main.cc:92] Flatcar Update Engine starting May 17 00:41:02.890083 update_engine[1710]: I0517 00:41:02.835413 1710 update_check_scheduler.cc:74] Next update check in 11m20s May 17 00:41:02.831029 systemd[1]: Started update-engine.service. May 17 00:41:02.834159 systemd[1]: Started locksmithd.service. May 17 00:41:02.895208 env[1725]: time="2025-05-17T00:41:02.893798748Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:41:02.902901 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 May 17 00:41:02.917781 extend-filesystems[1761]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required May 17 00:41:02.917781 extend-filesystems[1761]: old_desc_blocks = 1, new_desc_blocks = 1 May 17 00:41:02.917781 extend-filesystems[1761]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. May 17 00:41:02.924736 extend-filesystems[1703]: Resized filesystem in /dev/nvme0n1p9 May 17 00:41:02.920119 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:41:02.925991 bash[1766]: Updated "/home/core/.ssh/authorized_keys" May 17 00:41:02.921293 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:41:02.921517 systemd[1]: Finished extend-filesystems.service. May 17 00:41:02.932671 systemd-logind[1709]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:41:02.933537 systemd-logind[1709]: Watching system buttons on /dev/input/event2 (Sleep Button) May 17 00:41:02.933655 systemd-logind[1709]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:41:02.935567 systemd-logind[1709]: New seat seat0. May 17 00:41:02.943536 systemd[1]: Started systemd-logind.service. May 17 00:41:02.964546 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:41:03.034827 env[1725]: time="2025-05-17T00:41:03.034707705Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:41:03.036641 env[1725]: time="2025-05-17T00:41:03.036602113Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:41:03.040102 dbus-daemon[1701]: [system] Successfully activated service 'org.freedesktop.hostname1' May 17 00:41:03.040306 systemd[1]: Started systemd-hostnamed.service. May 17 00:41:03.044659 dbus-daemon[1701]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1742 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 17 00:41:03.045885 env[1725]: time="2025-05-17T00:41:03.045835243Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:41:03.046024 env[1725]: time="2025-05-17T00:41:03.046005437Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:41:03.049671 systemd[1]: Starting polkit.service... May 17 00:41:03.053622 env[1725]: time="2025-05-17T00:41:03.053580997Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:41:03.053776 env[1725]: time="2025-05-17T00:41:03.053756503Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:41:03.053864 env[1725]: time="2025-05-17T00:41:03.053846544Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:41:03.053932 env[1725]: time="2025-05-17T00:41:03.053918740Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:41:03.054120 env[1725]: time="2025-05-17T00:41:03.054101547Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:41:03.054537 env[1725]: time="2025-05-17T00:41:03.054515060Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:41:03.054852 env[1725]: time="2025-05-17T00:41:03.054824534Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:41:03.057512 env[1725]: time="2025-05-17T00:41:03.057477554Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:41:03.057746 env[1725]: time="2025-05-17T00:41:03.057709657Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:41:03.057854 env[1725]: time="2025-05-17T00:41:03.057838689Z" level=info msg="metadata content store policy set" policy=shared May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.065670694Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.065751301Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.065772496Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.065832492Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.065854392Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.065931620Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.065952127Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.065971999Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.065992197Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.066011580Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.066029154Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.066049135Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.066207981Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:41:03.068368 env[1725]: time="2025-05-17T00:41:03.066302225Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.066856915Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.066902083Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.066924398Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.066993746Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.067015450Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.067096218Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.067118162Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.067140171Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.067159904Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.067182317Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.067202555Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.067225595Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.067394556Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.067421936Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:41:03.069053 env[1725]: time="2025-05-17T00:41:03.067466878Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:41:03.072495 env[1725]: time="2025-05-17T00:41:03.067485747Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:41:03.072495 env[1725]: time="2025-05-17T00:41:03.067512645Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:41:03.072495 env[1725]: time="2025-05-17T00:41:03.067531001Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:41:03.072495 env[1725]: time="2025-05-17T00:41:03.067560731Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:41:03.072495 env[1725]: time="2025-05-17T00:41:03.067607227Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:41:03.070790 systemd[1]: Started containerd.service. May 17 00:41:03.072870 env[1725]: time="2025-05-17T00:41:03.067872600Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:41:03.072870 env[1725]: time="2025-05-17T00:41:03.067952167Z" level=info msg="Connect containerd service" May 17 00:41:03.072870 env[1725]: time="2025-05-17T00:41:03.067993265Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:41:03.072870 env[1725]: time="2025-05-17T00:41:03.069942863Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:41:03.072870 env[1725]: time="2025-05-17T00:41:03.070580486Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:41:03.072870 env[1725]: time="2025-05-17T00:41:03.070637890Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:41:03.077589 env[1725]: time="2025-05-17T00:41:03.073032844Z" level=info msg="containerd successfully booted in 0.227581s" May 17 00:41:03.077589 env[1725]: time="2025-05-17T00:41:03.073659940Z" level=info msg="Start subscribing containerd event" May 17 00:41:03.077589 env[1725]: time="2025-05-17T00:41:03.073735486Z" level=info msg="Start recovering state" May 17 00:41:03.077589 env[1725]: time="2025-05-17T00:41:03.073819580Z" level=info msg="Start event monitor" May 17 00:41:03.077589 env[1725]: time="2025-05-17T00:41:03.073848690Z" level=info msg="Start snapshots syncer" May 17 00:41:03.077589 env[1725]: time="2025-05-17T00:41:03.073862965Z" level=info msg="Start cni network conf syncer for default" May 17 00:41:03.077589 env[1725]: time="2025-05-17T00:41:03.073873859Z" level=info msg="Start streaming server" May 17 00:41:03.084926 polkitd[1802]: Started polkitd version 121 May 17 00:41:03.112810 polkitd[1802]: Loading rules from directory /etc/polkit-1/rules.d May 17 00:41:03.112902 polkitd[1802]: Loading rules from directory /usr/share/polkit-1/rules.d May 17 00:41:03.115941 polkitd[1802]: Finished loading, compiling and executing 2 rules May 17 00:41:03.116522 dbus-daemon[1701]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 17 00:41:03.116712 systemd[1]: Started polkit.service. May 17 00:41:03.119087 polkitd[1802]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 17 00:41:03.148708 systemd-hostnamed[1742]: Hostname set to (transient) May 17 00:41:03.149539 systemd-resolved[1665]: System hostname changed to 'ip-172-31-31-18'. May 17 00:41:03.308865 coreos-metadata[1700]: May 17 00:41:03.308 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 May 17 00:41:03.328355 coreos-metadata[1700]: May 17 00:41:03.322 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 May 17 00:41:03.333469 coreos-metadata[1700]: May 17 00:41:03.333 INFO Fetch successful May 17 00:41:03.333469 coreos-metadata[1700]: May 17 00:41:03.333 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 May 17 00:41:03.334648 coreos-metadata[1700]: May 17 00:41:03.334 INFO Fetch successful May 17 00:41:03.337762 unknown[1700]: wrote ssh authorized keys file for user: core May 17 00:41:03.367234 update-ssh-keys[1871]: Updated "/home/core/.ssh/authorized_keys" May 17 00:41:03.368019 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 17 00:41:03.383501 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO Create new startup processor May 17 00:41:03.392096 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [LongRunningPluginsManager] registered plugins: {} May 17 00:41:03.392289 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO Initializing bookkeeping folders May 17 00:41:03.392371 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO removing the completed state files May 17 00:41:03.392471 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO Initializing bookkeeping folders for long running plugins May 17 00:41:03.392541 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO Initializing replies folder for MDS reply requests that couldn't reach the service May 17 00:41:03.392604 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO Initializing healthcheck folders for long running plugins May 17 00:41:03.392668 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO Initializing locations for inventory plugin May 17 00:41:03.392751 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO Initializing default location for custom inventory May 17 00:41:03.392814 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO Initializing default location for file inventory May 17 00:41:03.392872 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO Initializing default location for role inventory May 17 00:41:03.392927 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO Init the cloudwatchlogs publisher May 17 00:41:03.392992 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [instanceID=i-080779ddb3d4a713a] Successfully loaded platform independent plugin aws:configureDocker May 17 00:41:03.393055 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [instanceID=i-080779ddb3d4a713a] Successfully loaded platform independent plugin aws:refreshAssociation May 17 00:41:03.393111 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [instanceID=i-080779ddb3d4a713a] Successfully loaded platform independent plugin aws:softwareInventory May 17 00:41:03.393170 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [instanceID=i-080779ddb3d4a713a] Successfully loaded platform independent plugin aws:runPowerShellScript May 17 00:41:03.393233 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [instanceID=i-080779ddb3d4a713a] Successfully loaded platform independent plugin aws:updateSsmAgent May 17 00:41:03.393292 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [instanceID=i-080779ddb3d4a713a] Successfully loaded platform independent plugin aws:runDockerAction May 17 00:41:03.393352 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [instanceID=i-080779ddb3d4a713a] Successfully loaded platform independent plugin aws:configurePackage May 17 00:41:03.393419 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [instanceID=i-080779ddb3d4a713a] Successfully loaded platform independent plugin aws:downloadContent May 17 00:41:03.393514 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [instanceID=i-080779ddb3d4a713a] Successfully loaded platform independent plugin aws:runDocument May 17 00:41:03.393575 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [instanceID=i-080779ddb3d4a713a] Successfully loaded platform dependent plugin aws:runShellScript May 17 00:41:03.393642 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 May 17 00:41:03.393702 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO OS: linux, Arch: amd64 May 17 00:41:03.394939 amazon-ssm-agent[1698]: datastore file /var/lib/amazon/ssm/i-080779ddb3d4a713a/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute May 17 00:41:03.401198 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessagingDeliveryService] Starting document processing engine... May 17 00:41:03.497259 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessagingDeliveryService] [EngineProcessor] Starting May 17 00:41:03.591651 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing May 17 00:41:03.621882 locksmithd[1779]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:41:03.686071 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessagingDeliveryService] Starting message polling May 17 00:41:03.780794 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessagingDeliveryService] Starting send replies to MDS May 17 00:41:03.875876 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [instanceID=i-080779ddb3d4a713a] Starting association polling May 17 00:41:03.970915 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting May 17 00:41:04.067266 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessagingDeliveryService] [Association] Launching response handler May 17 00:41:04.162794 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing May 17 00:41:04.258450 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service May 17 00:41:04.354324 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized May 17 00:41:04.451192 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessageGatewayService] Starting session document processing engine... May 17 00:41:04.512938 systemd[1]: Created slice system-sshd.slice. May 17 00:41:04.547407 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessageGatewayService] [EngineProcessor] Starting May 17 00:41:04.643881 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. May 17 00:41:04.741378 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-080779ddb3d4a713a, requestId: 928cea98-4d88-41ef-bf74-c0deb2c1476a May 17 00:41:04.839105 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [OfflineService] Starting document processing engine... May 17 00:41:04.936149 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [OfflineService] [EngineProcessor] Starting May 17 00:41:05.033449 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [OfflineService] [EngineProcessor] Initial processing May 17 00:41:05.130797 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [OfflineService] Starting message polling May 17 00:41:05.228522 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [OfflineService] Starting send replies to MDS May 17 00:41:05.326812 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [LongRunningPluginsManager] starting long running plugin manager May 17 00:41:05.329962 systemd[1]: Started kubelet.service. May 17 00:41:05.424852 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute May 17 00:41:05.522874 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [HealthCheck] HealthCheck reporting agent health. May 17 00:41:05.621650 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck May 17 00:41:05.653859 sshd_keygen[1736]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:41:05.679259 systemd[1]: Finished sshd-keygen.service. May 17 00:41:05.681866 systemd[1]: Starting issuegen.service... May 17 00:41:05.684203 systemd[1]: Started sshd@0-172.31.31.18:22-139.178.68.195:51074.service. May 17 00:41:05.692172 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:41:05.692416 systemd[1]: Finished issuegen.service. May 17 00:41:05.695313 systemd[1]: Starting systemd-user-sessions.service... May 17 00:41:05.707657 systemd[1]: Finished systemd-user-sessions.service. May 17 00:41:05.710512 systemd[1]: Started getty@tty1.service. May 17 00:41:05.713182 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:41:05.715081 systemd[1]: Reached target getty.target. May 17 00:41:05.715949 systemd[1]: Reached target multi-user.target. May 17 00:41:05.719283 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:41:05.720610 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [StartupProcessor] Executing startup processor tasks May 17 00:41:05.730939 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:41:05.731149 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:41:05.731846 systemd[1]: Startup finished in 561ms (kernel) + 5.670s (initrd) + 9.365s (userspace) = 15.597s. May 17 00:41:05.819217 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running May 17 00:41:05.875681 sshd[1909]: Accepted publickey for core from 139.178.68.195 port 51074 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:05.879192 sshd[1909]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:05.892256 systemd[1]: Created slice user-500.slice. May 17 00:41:05.893415 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:41:05.897670 systemd-logind[1709]: New session 1 of user core. May 17 00:41:05.904554 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:41:05.906193 systemd[1]: Starting user@500.service... May 17 00:41:05.912068 (systemd)[1918]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:05.918246 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk May 17 00:41:06.017210 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.7 May 17 00:41:06.022705 systemd[1918]: Queued start job for default target default.target. May 17 00:41:06.023455 systemd[1918]: Reached target paths.target. May 17 00:41:06.023478 systemd[1918]: Reached target sockets.target. May 17 00:41:06.023491 systemd[1918]: Reached target timers.target. May 17 00:41:06.023503 systemd[1918]: Reached target basic.target. May 17 00:41:06.023548 systemd[1918]: Reached target default.target. May 17 00:41:06.023578 systemd[1918]: Startup finished in 102ms. May 17 00:41:06.023666 systemd[1]: Started user@500.service. May 17 00:41:06.024615 systemd[1]: Started session-1.scope. May 17 00:41:06.116489 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessageGatewayService] listening reply. May 17 00:41:06.165011 systemd[1]: Started sshd@1-172.31.31.18:22-139.178.68.195:51086.service. May 17 00:41:06.215901 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-080779ddb3d4a713a?role=subscribe&stream=input May 17 00:41:06.315546 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-080779ddb3d4a713a?role=subscribe&stream=input May 17 00:41:06.328482 sshd[1927]: Accepted publickey for core from 139.178.68.195 port 51086 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:06.328969 sshd[1927]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:06.334632 systemd-logind[1709]: New session 2 of user core. May 17 00:41:06.335063 systemd[1]: Started session-2.scope. May 17 00:41:06.415305 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessageGatewayService] Starting receiving message from control channel May 17 00:41:06.460864 sshd[1927]: pam_unix(sshd:session): session closed for user core May 17 00:41:06.464791 systemd[1]: sshd@1-172.31.31.18:22-139.178.68.195:51086.service: Deactivated successfully. May 17 00:41:06.465732 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:41:06.466601 systemd-logind[1709]: Session 2 logged out. Waiting for processes to exit. May 17 00:41:06.467659 systemd-logind[1709]: Removed session 2. May 17 00:41:06.485308 systemd[1]: Started sshd@2-172.31.31.18:22-139.178.68.195:51088.service. May 17 00:41:06.515305 amazon-ssm-agent[1698]: 2025-05-17 00:41:03 INFO [MessageGatewayService] [EngineProcessor] Initial processing May 17 00:41:06.571237 kubelet[1893]: E0517 00:41:06.571178 1893 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:41:06.573064 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:41:06.573198 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:41:06.573455 systemd[1]: kubelet.service: Consumed 1.249s CPU time. May 17 00:41:06.615463 amazon-ssm-agent[1698]: 2025-05-17 00:41:05 INFO [HealthCheck] HealthCheck reporting agent health. May 17 00:41:06.638616 sshd[1933]: Accepted publickey for core from 139.178.68.195 port 51088 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:06.640088 sshd[1933]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:06.645133 systemd-logind[1709]: New session 3 of user core. May 17 00:41:06.645890 systemd[1]: Started session-3.scope. May 17 00:41:06.766241 sshd[1933]: pam_unix(sshd:session): session closed for user core May 17 00:41:06.768935 systemd[1]: sshd@2-172.31.31.18:22-139.178.68.195:51088.service: Deactivated successfully. May 17 00:41:06.769622 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:41:06.770199 systemd-logind[1709]: Session 3 logged out. Waiting for processes to exit. May 17 00:41:06.770899 systemd-logind[1709]: Removed session 3. May 17 00:41:06.792257 systemd[1]: Started sshd@3-172.31.31.18:22-139.178.68.195:51100.service. May 17 00:41:06.953320 sshd[1939]: Accepted publickey for core from 139.178.68.195 port 51100 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:06.954892 sshd[1939]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:06.960548 systemd[1]: Started session-4.scope. May 17 00:41:06.961122 systemd-logind[1709]: New session 4 of user core. May 17 00:41:07.092074 sshd[1939]: pam_unix(sshd:session): session closed for user core May 17 00:41:07.094976 systemd[1]: sshd@3-172.31.31.18:22-139.178.68.195:51100.service: Deactivated successfully. May 17 00:41:07.095657 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:41:07.096150 systemd-logind[1709]: Session 4 logged out. Waiting for processes to exit. May 17 00:41:07.096912 systemd-logind[1709]: Removed session 4. May 17 00:41:07.118841 systemd[1]: Started sshd@4-172.31.31.18:22-139.178.68.195:51102.service. May 17 00:41:07.279219 sshd[1945]: Accepted publickey for core from 139.178.68.195 port 51102 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:07.280689 sshd[1945]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:07.286105 systemd[1]: Started session-5.scope. May 17 00:41:07.286786 systemd-logind[1709]: New session 5 of user core. May 17 00:41:07.418350 sudo[1948]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:41:07.418629 sudo[1948]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:41:07.426875 dbus-daemon[1701]: \xd0\xddu\xb5%V: received setenforce notice (enforcing=2068171728) May 17 00:41:07.428481 sudo[1948]: pam_unix(sudo:session): session closed for user root May 17 00:41:07.453418 sshd[1945]: pam_unix(sshd:session): session closed for user core May 17 00:41:07.456942 systemd[1]: sshd@4-172.31.31.18:22-139.178.68.195:51102.service: Deactivated successfully. May 17 00:41:07.457965 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:41:07.458706 systemd-logind[1709]: Session 5 logged out. Waiting for processes to exit. May 17 00:41:07.459744 systemd-logind[1709]: Removed session 5. May 17 00:41:07.479208 systemd[1]: Started sshd@5-172.31.31.18:22-139.178.68.195:51118.service. May 17 00:41:07.639546 sshd[1952]: Accepted publickey for core from 139.178.68.195 port 51118 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:07.640953 sshd[1952]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:07.645079 systemd-logind[1709]: New session 6 of user core. May 17 00:41:07.646167 systemd[1]: Started session-6.scope. May 17 00:41:07.752002 sudo[1956]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:41:07.752241 sudo[1956]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:41:07.755813 sudo[1956]: pam_unix(sudo:session): session closed for user root May 17 00:41:07.761119 sudo[1955]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:41:07.761360 sudo[1955]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:41:07.771628 systemd[1]: Stopping audit-rules.service... May 17 00:41:07.771000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:41:07.773550 auditctl[1959]: No rules May 17 00:41:07.773902 kernel: kauditd_printk_skb: 51 callbacks suppressed May 17 00:41:07.773938 kernel: audit: type=1305 audit(1747442467.771:216): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:41:07.779518 kernel: audit: type=1300 audit(1747442467.771:216): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd607cc880 a2=420 a3=0 items=0 ppid=1 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.771000 audit[1959]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd607cc880 a2=420 a3=0 items=0 ppid=1 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.775705 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:41:07.775868 systemd[1]: Stopped audit-rules.service. May 17 00:41:07.777470 systemd[1]: Starting audit-rules.service... May 17 00:41:07.781573 kernel: audit: type=1327 audit(1747442467.771:216): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:41:07.771000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:41:07.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:07.786256 kernel: audit: type=1131 audit(1747442467.774:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:07.798243 augenrules[1976]: No rules May 17 00:41:07.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:07.798867 systemd[1]: Finished audit-rules.service. May 17 00:41:07.802816 sudo[1955]: pam_unix(sudo:session): session closed for user root May 17 00:41:07.803624 kernel: audit: type=1130 audit(1747442467.797:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:07.801000 audit[1955]: USER_END pid=1955 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:07.801000 audit[1955]: CRED_DISP pid=1955 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:07.811615 kernel: audit: type=1106 audit(1747442467.801:219): pid=1955 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:07.811788 kernel: audit: type=1104 audit(1747442467.801:220): pid=1955 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:07.825903 sshd[1952]: pam_unix(sshd:session): session closed for user core May 17 00:41:07.825000 audit[1952]: USER_END pid=1952 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:07.828781 systemd[1]: sshd@5-172.31.31.18:22-139.178.68.195:51118.service: Deactivated successfully. May 17 00:41:07.829449 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:41:07.830841 systemd-logind[1709]: Session 6 logged out. Waiting for processes to exit. May 17 00:41:07.825000 audit[1952]: CRED_DISP pid=1952 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:07.831832 systemd-logind[1709]: Removed session 6. May 17 00:41:07.835988 kernel: audit: type=1106 audit(1747442467.825:221): pid=1952 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:07.836092 kernel: audit: type=1104 audit(1747442467.825:222): pid=1952 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:07.836118 kernel: audit: type=1131 audit(1747442467.827:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.18:22-139.178.68.195:51118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:07.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.18:22-139.178.68.195:51118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:07.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.18:22-139.178.68.195:51122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:07.850795 systemd[1]: Started sshd@6-172.31.31.18:22-139.178.68.195:51122.service. May 17 00:41:08.005000 audit[1982]: USER_ACCT pid=1982 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:08.007585 sshd[1982]: Accepted publickey for core from 139.178.68.195 port 51122 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:41:08.007000 audit[1982]: CRED_ACQ pid=1982 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:08.007000 audit[1982]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc382fddd0 a2=3 a3=0 items=0 ppid=1 pid=1982 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.007000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:08.009336 sshd[1982]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:08.015039 systemd[1]: Started session-7.scope. May 17 00:41:08.015689 systemd-logind[1709]: New session 7 of user core. May 17 00:41:08.019000 audit[1982]: USER_START pid=1982 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:08.021000 audit[1984]: CRED_ACQ pid=1984 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:08.116000 audit[1985]: USER_ACCT pid=1985 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:08.117000 audit[1985]: CRED_REFR pid=1985 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:08.118381 sudo[1985]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:41:08.118632 sudo[1985]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:41:08.119000 audit[1985]: USER_START pid=1985 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:08.132988 systemd[1]: Starting coreos-metadata.service... May 17 00:41:08.212749 coreos-metadata[1989]: May 17 00:41:08.212 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 May 17 00:41:08.214020 coreos-metadata[1989]: May 17 00:41:08.213 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 May 17 00:41:08.214754 coreos-metadata[1989]: May 17 00:41:08.214 INFO Fetch successful May 17 00:41:08.214857 coreos-metadata[1989]: May 17 00:41:08.214 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 May 17 00:41:08.215586 coreos-metadata[1989]: May 17 00:41:08.215 INFO Fetch successful May 17 00:41:08.215661 coreos-metadata[1989]: May 17 00:41:08.215 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 May 17 00:41:08.216214 coreos-metadata[1989]: May 17 00:41:08.216 INFO Fetch successful May 17 00:41:08.216269 coreos-metadata[1989]: May 17 00:41:08.216 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 May 17 00:41:08.216858 coreos-metadata[1989]: May 17 00:41:08.216 INFO Fetch successful May 17 00:41:08.216858 coreos-metadata[1989]: May 17 00:41:08.216 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 May 17 00:41:08.217490 coreos-metadata[1989]: May 17 00:41:08.217 INFO Fetch successful May 17 00:41:08.220524 coreos-metadata[1989]: May 17 00:41:08.220 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 May 17 00:41:08.221465 coreos-metadata[1989]: May 17 00:41:08.221 INFO Fetch successful May 17 00:41:08.221563 coreos-metadata[1989]: May 17 00:41:08.221 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 May 17 00:41:08.222339 coreos-metadata[1989]: May 17 00:41:08.222 INFO Fetch successful May 17 00:41:08.222399 coreos-metadata[1989]: May 17 00:41:08.222 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 May 17 00:41:08.222849 coreos-metadata[1989]: May 17 00:41:08.222 INFO Fetch successful May 17 00:41:08.231680 systemd[1]: Finished coreos-metadata.service. May 17 00:41:08.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:09.279476 systemd[1]: Stopped kubelet.service. May 17 00:41:09.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:09.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:09.280311 systemd[1]: kubelet.service: Consumed 1.249s CPU time. May 17 00:41:09.282580 systemd[1]: Starting kubelet.service... May 17 00:41:09.312643 systemd[1]: Reloading. May 17 00:41:09.424087 /usr/lib/systemd/system-generators/torcx-generator[2042]: time="2025-05-17T00:41:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:41:09.434525 /usr/lib/systemd/system-generators/torcx-generator[2042]: time="2025-05-17T00:41:09Z" level=info msg="torcx already run" May 17 00:41:09.559870 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:41:09.559901 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:41:09.578706 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:41:09.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.656000 audit: BPF prog-id=49 op=LOAD May 17 00:41:09.657000 audit: BPF prog-id=30 op=UNLOAD May 17 00:41:09.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit: BPF prog-id=50 op=LOAD May 17 00:41:09.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.657000 audit: BPF prog-id=51 op=LOAD May 17 00:41:09.657000 audit: BPF prog-id=31 op=UNLOAD May 17 00:41:09.657000 audit: BPF prog-id=32 op=UNLOAD May 17 00:41:09.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit: BPF prog-id=52 op=LOAD May 17 00:41:09.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.658000 audit: BPF prog-id=53 op=LOAD May 17 00:41:09.658000 audit: BPF prog-id=33 op=UNLOAD May 17 00:41:09.658000 audit: BPF prog-id=34 op=UNLOAD May 17 00:41:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit: BPF prog-id=54 op=LOAD May 17 00:41:09.659000 audit: BPF prog-id=35 op=UNLOAD May 17 00:41:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit: BPF prog-id=55 op=LOAD May 17 00:41:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.659000 audit: BPF prog-id=56 op=LOAD May 17 00:41:09.659000 audit: BPF prog-id=36 op=UNLOAD May 17 00:41:09.659000 audit: BPF prog-id=37 op=UNLOAD May 17 00:41:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit: BPF prog-id=57 op=LOAD May 17 00:41:09.660000 audit: BPF prog-id=44 op=UNLOAD May 17 00:41:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit: BPF prog-id=58 op=LOAD May 17 00:41:09.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit: BPF prog-id=59 op=LOAD May 17 00:41:09.661000 audit: BPF prog-id=45 op=UNLOAD May 17 00:41:09.661000 audit: BPF prog-id=46 op=UNLOAD May 17 00:41:09.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.662000 audit: BPF prog-id=60 op=LOAD May 17 00:41:09.662000 audit: BPF prog-id=38 op=UNLOAD May 17 00:41:09.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.664000 audit: BPF prog-id=61 op=LOAD May 17 00:41:09.664000 audit: BPF prog-id=47 op=UNLOAD May 17 00:41:09.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.666000 audit: BPF prog-id=62 op=LOAD May 17 00:41:09.666000 audit: BPF prog-id=39 op=UNLOAD May 17 00:41:09.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.667000 audit: BPF prog-id=63 op=LOAD May 17 00:41:09.667000 audit: BPF prog-id=40 op=UNLOAD May 17 00:41:09.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit: BPF prog-id=64 op=LOAD May 17 00:41:09.669000 audit: BPF prog-id=41 op=UNLOAD May 17 00:41:09.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit: BPF prog-id=65 op=LOAD May 17 00:41:09.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:09.669000 audit: BPF prog-id=66 op=LOAD May 17 00:41:09.669000 audit: BPF prog-id=42 op=UNLOAD May 17 00:41:09.669000 audit: BPF prog-id=43 op=UNLOAD May 17 00:41:09.693578 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 00:41:09.693675 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 00:41:09.693999 systemd[1]: Stopped kubelet.service. May 17 00:41:09.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:41:09.695968 systemd[1]: Starting kubelet.service... May 17 00:41:09.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:09.925578 systemd[1]: Started kubelet.service. May 17 00:41:09.967683 kubelet[2103]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:41:09.967683 kubelet[2103]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:41:09.967683 kubelet[2103]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:41:09.968048 kubelet[2103]: I0517 00:41:09.967744 2103 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:41:10.388981 kubelet[2103]: I0517 00:41:10.388557 2103 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:41:10.388981 kubelet[2103]: I0517 00:41:10.388589 2103 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:41:10.388981 kubelet[2103]: I0517 00:41:10.388869 2103 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:41:10.431812 kubelet[2103]: I0517 00:41:10.431783 2103 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:41:10.447236 kubelet[2103]: E0517 00:41:10.447197 2103 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:41:10.447236 kubelet[2103]: I0517 00:41:10.447229 2103 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:41:10.450562 kubelet[2103]: I0517 00:41:10.450532 2103 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:41:10.450785 kubelet[2103]: I0517 00:41:10.450752 2103 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:41:10.451014 kubelet[2103]: I0517 00:41:10.450791 2103 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.31.18","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:41:10.451148 kubelet[2103]: I0517 00:41:10.451026 2103 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:41:10.451148 kubelet[2103]: I0517 00:41:10.451036 2103 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:41:10.451148 kubelet[2103]: I0517 00:41:10.451146 2103 state_mem.go:36] "Initialized new in-memory state store" May 17 00:41:10.461935 kubelet[2103]: I0517 00:41:10.461890 2103 kubelet.go:446] "Attempting to sync node with API server" May 17 00:41:10.461935 kubelet[2103]: I0517 00:41:10.461945 2103 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:41:10.462096 kubelet[2103]: I0517 00:41:10.461968 2103 kubelet.go:352] "Adding apiserver pod source" May 17 00:41:10.462096 kubelet[2103]: I0517 00:41:10.461990 2103 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:41:10.475045 kubelet[2103]: E0517 00:41:10.474993 2103 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:10.475280 kubelet[2103]: E0517 00:41:10.475248 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:10.476159 kubelet[2103]: I0517 00:41:10.476145 2103 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:41:10.476674 kubelet[2103]: I0517 00:41:10.476655 2103 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:41:10.478021 kubelet[2103]: W0517 00:41:10.477989 2103 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:41:10.481636 kubelet[2103]: I0517 00:41:10.481594 2103 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:41:10.481888 kubelet[2103]: I0517 00:41:10.481652 2103 server.go:1287] "Started kubelet" May 17 00:41:10.482040 kubelet[2103]: I0517 00:41:10.481985 2103 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:41:10.483355 kubelet[2103]: I0517 00:41:10.482907 2103 server.go:479] "Adding debug handlers to kubelet server" May 17 00:41:10.483000 audit[2103]: AVC avc: denied { mac_admin } for pid=2103 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.483000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:41:10.483000 audit[2103]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000603e60 a1=c000a7f188 a2=c000603e00 a3=25 items=0 ppid=1 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.483000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:41:10.483000 audit[2103]: AVC avc: denied { mac_admin } for pid=2103 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.483000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:41:10.483000 audit[2103]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004417e0 a1=c000a7f1a0 a2=c000603f80 a3=25 items=0 ppid=1 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.483000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:41:10.485398 kubelet[2103]: I0517 00:41:10.485049 2103 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:41:10.485398 kubelet[2103]: I0517 00:41:10.485091 2103 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:41:10.485398 kubelet[2103]: I0517 00:41:10.485141 2103 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:41:10.487283 kubelet[2103]: I0517 00:41:10.487222 2103 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:41:10.487619 kubelet[2103]: I0517 00:41:10.487484 2103 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:41:10.491452 kubelet[2103]: I0517 00:41:10.491351 2103 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:41:10.493791 kubelet[2103]: E0517 00:41:10.493746 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:10.493791 kubelet[2103]: I0517 00:41:10.493775 2103 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:41:10.494788 kubelet[2103]: I0517 00:41:10.493915 2103 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:41:10.494788 kubelet[2103]: I0517 00:41:10.493958 2103 reconciler.go:26] "Reconciler: start to sync state" May 17 00:41:10.494904 kubelet[2103]: I0517 00:41:10.494806 2103 factory.go:221] Registration of the systemd container factory successfully May 17 00:41:10.494978 kubelet[2103]: I0517 00:41:10.494898 2103 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:41:10.495643 kubelet[2103]: E0517 00:41:10.495377 2103 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:41:10.495712 kubelet[2103]: I0517 00:41:10.495675 2103 factory.go:221] Registration of the containerd container factory successfully May 17 00:41:10.507312 kubelet[2103]: W0517 00:41:10.507286 2103 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.31.18" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 17 00:41:10.507421 kubelet[2103]: E0517 00:41:10.507328 2103 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"172.31.31.18\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 17 00:41:10.507421 kubelet[2103]: W0517 00:41:10.507389 2103 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 17 00:41:10.507421 kubelet[2103]: E0517 00:41:10.507400 2103 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" May 17 00:41:10.508519 kubelet[2103]: I0517 00:41:10.508501 2103 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:41:10.508519 kubelet[2103]: I0517 00:41:10.508514 2103 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:41:10.508609 kubelet[2103]: I0517 00:41:10.508529 2103 state_mem.go:36] "Initialized new in-memory state store" May 17 00:41:10.509858 kubelet[2103]: E0517 00:41:10.507912 2103 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.31.18.184029ab267ce924 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.31.18,UID:172.31.31.18,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.31.18,},FirstTimestamp:2025-05-17 00:41:10.481619236 +0000 UTC m=+0.552294953,LastTimestamp:2025-05-17 00:41:10.481619236 +0000 UTC m=+0.552294953,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.31.18,}" May 17 00:41:10.514145 kubelet[2103]: I0517 00:41:10.513336 2103 policy_none.go:49] "None policy: Start" May 17 00:41:10.514145 kubelet[2103]: I0517 00:41:10.514150 2103 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:41:10.514301 kubelet[2103]: I0517 00:41:10.514164 2103 state_mem.go:35] "Initializing new in-memory state store" May 17 00:41:10.524754 systemd[1]: Created slice kubepods.slice. May 17 00:41:10.528805 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:41:10.531413 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:41:10.536107 kubelet[2103]: W0517 00:41:10.536086 2103 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope May 17 00:41:10.536247 kubelet[2103]: E0517 00:41:10.536231 2103 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" May 17 00:41:10.536438 kubelet[2103]: E0517 00:41:10.536357 2103 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.31.18.184029ab274eb63b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.31.18,UID:172.31.31.18,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.31.31.18,},FirstTimestamp:2025-05-17 00:41:10.495368763 +0000 UTC m=+0.566044485,LastTimestamp:2025-05-17 00:41:10.495368763 +0000 UTC m=+0.566044485,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.31.18,}" May 17 00:41:10.536743 kubelet[2103]: E0517 00:41:10.536727 2103 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.31.18\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" May 17 00:41:10.540533 kubelet[2103]: I0517 00:41:10.540516 2103 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:41:10.540802 kubelet[2103]: I0517 00:41:10.540788 2103 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:41:10.539000 audit[2103]: AVC avc: denied { mac_admin } for pid=2103 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:10.539000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:41:10.539000 audit[2103]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d5d020 a1=c000d46dc8 a2=c000d5cff0 a3=25 items=0 ppid=1 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.539000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:41:10.543457 kubelet[2103]: I0517 00:41:10.543011 2103 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:41:10.543457 kubelet[2103]: I0517 00:41:10.543026 2103 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:41:10.543457 kubelet[2103]: I0517 00:41:10.543365 2103 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:41:10.544281 kubelet[2103]: E0517 00:41:10.544264 2103 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:41:10.544348 kubelet[2103]: E0517 00:41:10.544296 2103 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.31.18\" not found" May 17 00:41:10.543000 audit[2120]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:10.543000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffef2fc0ce0 a2=0 a3=7ffef2fc0ccc items=0 ppid=2103 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.543000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:41:10.544000 audit[2123]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2123 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:10.544000 audit[2123]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffddcb334d0 a2=0 a3=7ffddcb334bc items=0 ppid=2103 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.544000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:41:10.558886 kubelet[2103]: E0517 00:41:10.558760 2103 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.31.18.184029ab28080dc2 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.31.18,UID:172.31.31.18,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 172.31.31.18 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:172.31.31.18,},FirstTimestamp:2025-05-17 00:41:10.50751533 +0000 UTC m=+0.578191046,LastTimestamp:2025-05-17 00:41:10.50751533 +0000 UTC m=+0.578191046,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.31.18,}" May 17 00:41:10.567192 kubelet[2103]: E0517 00:41:10.567092 2103 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.31.18.184029ab28082013 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.31.18,UID:172.31.31.18,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 172.31.31.18 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:172.31.31.18,},FirstTimestamp:2025-05-17 00:41:10.507520019 +0000 UTC m=+0.578195734,LastTimestamp:2025-05-17 00:41:10.507520019 +0000 UTC m=+0.578195734,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.31.18,}" May 17 00:41:10.553000 audit[2125]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:10.553000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc97e77a40 a2=0 a3=7ffc97e77a2c items=0 ppid=2103 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:41:10.572000 audit[2130]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:10.572000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd0df38e70 a2=0 a3=7ffd0df38e5c items=0 ppid=2103 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:41:10.594032 kubelet[2103]: E0517 00:41:10.593943 2103 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.31.18.184029ab280829ef default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.31.18,UID:172.31.31.18,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 172.31.31.18 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:172.31.31.18,},FirstTimestamp:2025-05-17 00:41:10.507522543 +0000 UTC m=+0.578198258,LastTimestamp:2025-05-17 00:41:10.507522543 +0000 UTC m=+0.578198258,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.31.18,}" May 17 00:41:10.601876 kubelet[2103]: E0517 00:41:10.601639 2103 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.31.18.184029ab2a452ec5 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.31.18,UID:172.31.31.18,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:172.31.31.18,},FirstTimestamp:2025-05-17 00:41:10.545075909 +0000 UTC m=+0.615751616,LastTimestamp:2025-05-17 00:41:10.545075909 +0000 UTC m=+0.615751616,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.31.18,}" May 17 00:41:10.624000 audit[2135]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2135 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:10.624000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc60fefe20 a2=0 a3=7ffc60fefe0c items=0 ppid=2103 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:41:10.626350 kubelet[2103]: I0517 00:41:10.626292 2103 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:41:10.625000 audit[2136]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:10.625000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc065e51e0 a2=0 a3=7ffc065e51cc items=0 ppid=2103 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:41:10.627487 kubelet[2103]: I0517 00:41:10.627422 2103 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:41:10.627487 kubelet[2103]: I0517 00:41:10.627456 2103 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:41:10.627487 kubelet[2103]: I0517 00:41:10.627474 2103 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:41:10.627487 kubelet[2103]: I0517 00:41:10.627481 2103 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:41:10.627607 kubelet[2103]: E0517 00:41:10.627591 2103 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 17 00:41:10.626000 audit[2137]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:10.626000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5c23fb60 a2=0 a3=7ffc5c23fb4c items=0 ppid=2103 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:41:10.628000 audit[2138]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:10.628000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7930d9c0 a2=0 a3=7ffe7930d9ac items=0 ppid=2103 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:41:10.628000 audit[2139]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:10.628000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe49f7afa0 a2=0 a3=7ffe49f7af8c items=0 ppid=2103 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:41:10.629000 audit[2140]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:10.629000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd05bae800 a2=0 a3=7ffd05bae7ec items=0 ppid=2103 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:41:10.629000 audit[2141]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:10.629000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc6dbe290 a2=0 a3=7ffdc6dbe27c items=0 ppid=2103 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.629000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:41:10.630000 audit[2142]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:10.630000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe087d5020 a2=0 a3=7ffe087d500c items=0 ppid=2103 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.630000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:41:10.647120 kubelet[2103]: I0517 00:41:10.644405 2103 kubelet_node_status.go:75] "Attempting to register node" node="172.31.31.18" May 17 00:41:10.697911 kubelet[2103]: I0517 00:41:10.697855 2103 kubelet_node_status.go:78] "Successfully registered node" node="172.31.31.18" May 17 00:41:10.697911 kubelet[2103]: E0517 00:41:10.697901 2103 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"172.31.31.18\": node \"172.31.31.18\" not found" May 17 00:41:10.765917 kubelet[2103]: E0517 00:41:10.765859 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:10.867020 kubelet[2103]: E0517 00:41:10.866964 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:10.968179 kubelet[2103]: E0517 00:41:10.968061 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:10.976193 sudo[1985]: pam_unix(sudo:session): session closed for user root May 17 00:41:10.974000 audit[1985]: USER_END pid=1985 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:10.974000 audit[1985]: CRED_DISP pid=1985 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:10.998282 sshd[1982]: pam_unix(sshd:session): session closed for user core May 17 00:41:10.998000 audit[1982]: USER_END pid=1982 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:10.998000 audit[1982]: CRED_DISP pid=1982 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:41:11.000909 systemd[1]: sshd@6-172.31.31.18:22-139.178.68.195:51122.service: Deactivated successfully. May 17 00:41:10.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.18:22-139.178.68.195:51122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:11.001966 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:41:11.002413 systemd-logind[1709]: Session 7 logged out. Waiting for processes to exit. May 17 00:41:11.003672 systemd-logind[1709]: Removed session 7. May 17 00:41:11.068630 kubelet[2103]: E0517 00:41:11.068574 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:11.169150 kubelet[2103]: E0517 00:41:11.169101 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:11.270022 kubelet[2103]: E0517 00:41:11.269908 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:11.370802 kubelet[2103]: E0517 00:41:11.370761 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:11.391012 kubelet[2103]: I0517 00:41:11.390969 2103 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 17 00:41:11.391160 kubelet[2103]: W0517 00:41:11.391136 2103 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 17 00:41:11.391218 kubelet[2103]: W0517 00:41:11.391169 2103 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 17 00:41:11.471844 kubelet[2103]: E0517 00:41:11.471798 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:11.476240 kubelet[2103]: E0517 00:41:11.476204 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:11.572579 kubelet[2103]: E0517 00:41:11.572468 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:11.673772 kubelet[2103]: E0517 00:41:11.673624 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:11.774803 kubelet[2103]: E0517 00:41:11.774755 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:11.875690 kubelet[2103]: E0517 00:41:11.875493 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:11.976518 kubelet[2103]: E0517 00:41:11.976472 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:12.077257 kubelet[2103]: E0517 00:41:12.077208 2103 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"172.31.31.18\" not found" May 17 00:41:12.178839 kubelet[2103]: I0517 00:41:12.178522 2103 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 17 00:41:12.179154 env[1725]: time="2025-05-17T00:41:12.179106358Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:41:12.179588 kubelet[2103]: I0517 00:41:12.179367 2103 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 17 00:41:12.475035 kubelet[2103]: I0517 00:41:12.474681 2103 apiserver.go:52] "Watching apiserver" May 17 00:41:12.476591 kubelet[2103]: E0517 00:41:12.476563 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:12.479868 kubelet[2103]: E0517 00:41:12.479836 2103 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h2g6f" podUID="c0886405-922a-42c7-b394-b5abf5ec9865" May 17 00:41:12.484363 systemd[1]: Created slice kubepods-besteffort-pod55fac802_1c27_46d9_9d82_9c82e567b3ff.slice. May 17 00:41:12.492451 systemd[1]: Created slice kubepods-besteffort-podd6cc48ff_dd4b_4b49_bab8_0ae52ff56cdc.slice. May 17 00:41:12.494908 kubelet[2103]: I0517 00:41:12.494874 2103 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:41:12.506623 kubelet[2103]: I0517 00:41:12.506589 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c0886405-922a-42c7-b394-b5abf5ec9865-varrun\") pod \"csi-node-driver-h2g6f\" (UID: \"c0886405-922a-42c7-b394-b5abf5ec9865\") " pod="calico-system/csi-node-driver-h2g6f" May 17 00:41:12.506811 kubelet[2103]: I0517 00:41:12.506642 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc-cni-net-dir\") pod \"calico-node-nbcrr\" (UID: \"d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc\") " pod="calico-system/calico-node-nbcrr" May 17 00:41:12.506811 kubelet[2103]: I0517 00:41:12.506670 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-48gv5\" (UniqueName: \"kubernetes.io/projected/d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc-kube-api-access-48gv5\") pod \"calico-node-nbcrr\" (UID: \"d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc\") " pod="calico-system/calico-node-nbcrr" May 17 00:41:12.506811 kubelet[2103]: I0517 00:41:12.506694 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q6rgl\" (UniqueName: \"kubernetes.io/projected/c0886405-922a-42c7-b394-b5abf5ec9865-kube-api-access-q6rgl\") pod \"csi-node-driver-h2g6f\" (UID: \"c0886405-922a-42c7-b394-b5abf5ec9865\") " pod="calico-system/csi-node-driver-h2g6f" May 17 00:41:12.506811 kubelet[2103]: I0517 00:41:12.506717 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/55fac802-1c27-46d9-9d82-9c82e567b3ff-kube-proxy\") pod \"kube-proxy-r6p5n\" (UID: \"55fac802-1c27-46d9-9d82-9c82e567b3ff\") " pod="kube-system/kube-proxy-r6p5n" May 17 00:41:12.506811 kubelet[2103]: I0517 00:41:12.506739 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc-lib-modules\") pod \"calico-node-nbcrr\" (UID: \"d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc\") " pod="calico-system/calico-node-nbcrr" May 17 00:41:12.507045 kubelet[2103]: I0517 00:41:12.506763 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc-var-run-calico\") pod \"calico-node-nbcrr\" (UID: \"d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc\") " pod="calico-system/calico-node-nbcrr" May 17 00:41:12.507045 kubelet[2103]: I0517 00:41:12.506787 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc-xtables-lock\") pod \"calico-node-nbcrr\" (UID: \"d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc\") " pod="calico-system/calico-node-nbcrr" May 17 00:41:12.507045 kubelet[2103]: I0517 00:41:12.506812 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c0886405-922a-42c7-b394-b5abf5ec9865-registration-dir\") pod \"csi-node-driver-h2g6f\" (UID: \"c0886405-922a-42c7-b394-b5abf5ec9865\") " pod="calico-system/csi-node-driver-h2g6f" May 17 00:41:12.507045 kubelet[2103]: I0517 00:41:12.506836 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c0886405-922a-42c7-b394-b5abf5ec9865-socket-dir\") pod \"csi-node-driver-h2g6f\" (UID: \"c0886405-922a-42c7-b394-b5abf5ec9865\") " pod="calico-system/csi-node-driver-h2g6f" May 17 00:41:12.507045 kubelet[2103]: I0517 00:41:12.506862 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/55fac802-1c27-46d9-9d82-9c82e567b3ff-xtables-lock\") pod \"kube-proxy-r6p5n\" (UID: \"55fac802-1c27-46d9-9d82-9c82e567b3ff\") " pod="kube-system/kube-proxy-r6p5n" May 17 00:41:12.507263 kubelet[2103]: I0517 00:41:12.506886 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g6ddd\" (UniqueName: \"kubernetes.io/projected/55fac802-1c27-46d9-9d82-9c82e567b3ff-kube-api-access-g6ddd\") pod \"kube-proxy-r6p5n\" (UID: \"55fac802-1c27-46d9-9d82-9c82e567b3ff\") " pod="kube-system/kube-proxy-r6p5n" May 17 00:41:12.507263 kubelet[2103]: I0517 00:41:12.506928 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc-cni-log-dir\") pod \"calico-node-nbcrr\" (UID: \"d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc\") " pod="calico-system/calico-node-nbcrr" May 17 00:41:12.507263 kubelet[2103]: I0517 00:41:12.506956 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc-flexvol-driver-host\") pod \"calico-node-nbcrr\" (UID: \"d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc\") " pod="calico-system/calico-node-nbcrr" May 17 00:41:12.507263 kubelet[2103]: I0517 00:41:12.506980 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc-var-lib-calico\") pod \"calico-node-nbcrr\" (UID: \"d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc\") " pod="calico-system/calico-node-nbcrr" May 17 00:41:12.507263 kubelet[2103]: I0517 00:41:12.507006 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c0886405-922a-42c7-b394-b5abf5ec9865-kubelet-dir\") pod \"csi-node-driver-h2g6f\" (UID: \"c0886405-922a-42c7-b394-b5abf5ec9865\") " pod="calico-system/csi-node-driver-h2g6f" May 17 00:41:12.507520 kubelet[2103]: I0517 00:41:12.507033 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/55fac802-1c27-46d9-9d82-9c82e567b3ff-lib-modules\") pod \"kube-proxy-r6p5n\" (UID: \"55fac802-1c27-46d9-9d82-9c82e567b3ff\") " pod="kube-system/kube-proxy-r6p5n" May 17 00:41:12.507520 kubelet[2103]: I0517 00:41:12.507062 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc-cni-bin-dir\") pod \"calico-node-nbcrr\" (UID: \"d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc\") " pod="calico-system/calico-node-nbcrr" May 17 00:41:12.507520 kubelet[2103]: I0517 00:41:12.507100 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc-node-certs\") pod \"calico-node-nbcrr\" (UID: \"d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc\") " pod="calico-system/calico-node-nbcrr" May 17 00:41:12.507520 kubelet[2103]: I0517 00:41:12.507128 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc-policysync\") pod \"calico-node-nbcrr\" (UID: \"d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc\") " pod="calico-system/calico-node-nbcrr" May 17 00:41:12.507520 kubelet[2103]: I0517 00:41:12.507173 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc-tigera-ca-bundle\") pod \"calico-node-nbcrr\" (UID: \"d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc\") " pod="calico-system/calico-node-nbcrr" May 17 00:41:12.609000 kubelet[2103]: I0517 00:41:12.608973 2103 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:41:12.610692 kubelet[2103]: E0517 00:41:12.610672 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.610836 kubelet[2103]: W0517 00:41:12.610823 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.610917 kubelet[2103]: E0517 00:41:12.610906 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.623089 kubelet[2103]: E0517 00:41:12.623064 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.623944 kubelet[2103]: W0517 00:41:12.623924 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.624122 kubelet[2103]: E0517 00:41:12.624100 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.624860 kubelet[2103]: E0517 00:41:12.624841 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.624934 kubelet[2103]: W0517 00:41:12.624865 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.624934 kubelet[2103]: E0517 00:41:12.624887 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.633709 kubelet[2103]: E0517 00:41:12.627864 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.633709 kubelet[2103]: W0517 00:41:12.627882 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.633709 kubelet[2103]: E0517 00:41:12.627899 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.633709 kubelet[2103]: E0517 00:41:12.628077 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.633709 kubelet[2103]: W0517 00:41:12.628084 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.633709 kubelet[2103]: E0517 00:41:12.628091 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.633709 kubelet[2103]: E0517 00:41:12.628307 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.633709 kubelet[2103]: W0517 00:41:12.628314 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.633709 kubelet[2103]: E0517 00:41:12.628322 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.633709 kubelet[2103]: E0517 00:41:12.628481 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.634070 kubelet[2103]: W0517 00:41:12.628487 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.634070 kubelet[2103]: E0517 00:41:12.628495 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.634070 kubelet[2103]: E0517 00:41:12.628642 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.634070 kubelet[2103]: W0517 00:41:12.628649 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.634070 kubelet[2103]: E0517 00:41:12.628656 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.634070 kubelet[2103]: E0517 00:41:12.628789 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.634070 kubelet[2103]: W0517 00:41:12.628794 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.634070 kubelet[2103]: E0517 00:41:12.628801 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.634070 kubelet[2103]: E0517 00:41:12.628961 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.634070 kubelet[2103]: W0517 00:41:12.628970 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.634341 kubelet[2103]: E0517 00:41:12.628978 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.634341 kubelet[2103]: E0517 00:41:12.629358 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.634341 kubelet[2103]: W0517 00:41:12.629365 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.634341 kubelet[2103]: E0517 00:41:12.629375 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.634341 kubelet[2103]: E0517 00:41:12.629535 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.634341 kubelet[2103]: W0517 00:41:12.629541 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.634341 kubelet[2103]: E0517 00:41:12.629548 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.634341 kubelet[2103]: E0517 00:41:12.629687 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.634341 kubelet[2103]: W0517 00:41:12.629696 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.634341 kubelet[2103]: E0517 00:41:12.629706 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.634637 kubelet[2103]: E0517 00:41:12.629905 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.634637 kubelet[2103]: W0517 00:41:12.629912 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.634637 kubelet[2103]: E0517 00:41:12.629920 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.634637 kubelet[2103]: E0517 00:41:12.630077 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.634637 kubelet[2103]: W0517 00:41:12.630083 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.634637 kubelet[2103]: E0517 00:41:12.630091 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.634637 kubelet[2103]: E0517 00:41:12.630226 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.634637 kubelet[2103]: W0517 00:41:12.630233 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.634637 kubelet[2103]: E0517 00:41:12.630247 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.634637 kubelet[2103]: E0517 00:41:12.630744 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.634888 kubelet[2103]: W0517 00:41:12.630752 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.634888 kubelet[2103]: E0517 00:41:12.630761 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.637112 kubelet[2103]: E0517 00:41:12.637083 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.637112 kubelet[2103]: W0517 00:41:12.637108 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.637265 kubelet[2103]: E0517 00:41:12.637128 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.651838 kubelet[2103]: E0517 00:41:12.651817 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:12.652005 kubelet[2103]: W0517 00:41:12.651992 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:12.652154 kubelet[2103]: E0517 00:41:12.652140 2103 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:12.793936 env[1725]: time="2025-05-17T00:41:12.791643785Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r6p5n,Uid:55fac802-1c27-46d9-9d82-9c82e567b3ff,Namespace:kube-system,Attempt:0,}" May 17 00:41:12.811983 env[1725]: time="2025-05-17T00:41:12.811935850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nbcrr,Uid:d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc,Namespace:calico-system,Attempt:0,}" May 17 00:41:13.338635 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3725943728.mount: Deactivated successfully. May 17 00:41:13.348016 env[1725]: time="2025-05-17T00:41:13.347964157Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:13.361299 env[1725]: time="2025-05-17T00:41:13.361247986Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:13.369642 env[1725]: time="2025-05-17T00:41:13.369590662Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:13.370645 env[1725]: time="2025-05-17T00:41:13.370564647Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:13.375326 env[1725]: time="2025-05-17T00:41:13.375281530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:13.378400 env[1725]: time="2025-05-17T00:41:13.378349897Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:13.381296 env[1725]: time="2025-05-17T00:41:13.381260848Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:13.384471 env[1725]: time="2025-05-17T00:41:13.384414017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:13.407822 env[1725]: time="2025-05-17T00:41:13.407770462Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:13.407976 env[1725]: time="2025-05-17T00:41:13.407956628Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:13.408056 env[1725]: time="2025-05-17T00:41:13.408040584Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:13.408244 env[1725]: time="2025-05-17T00:41:13.408219257Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2b4daae0fcbe96958bd2d56f660256b4a0657bac184239c05a0875257d930b51 pid=2175 runtime=io.containerd.runc.v2 May 17 00:41:13.413209 env[1725]: time="2025-05-17T00:41:13.413150595Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:13.413320 env[1725]: time="2025-05-17T00:41:13.413229328Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:13.413320 env[1725]: time="2025-05-17T00:41:13.413252500Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:13.413474 env[1725]: time="2025-05-17T00:41:13.413417104Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/50ddcd07214caf216db9b409e9271ff50f1a65be56581d3c5c10db4b951e4004 pid=2193 runtime=io.containerd.runc.v2 May 17 00:41:13.425469 systemd[1]: Started cri-containerd-2b4daae0fcbe96958bd2d56f660256b4a0657bac184239c05a0875257d930b51.scope. May 17 00:41:13.442238 systemd[1]: Started cri-containerd-50ddcd07214caf216db9b409e9271ff50f1a65be56581d3c5c10db4b951e4004.scope. May 17 00:41:13.455140 kernel: kauditd_printk_skb: 275 callbacks suppressed May 17 00:41:13.455250 kernel: audit: type=1400 audit(1747442473.446:464): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.455485 kernel: audit: type=1400 audit(1747442473.446:465): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.479275 kernel: audit: type=1400 audit(1747442473.446:466): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.479407 kernel: audit: type=1400 audit(1747442473.446:467): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.479468 kernel: audit: type=1400 audit(1747442473.446:468): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.479606 kubelet[2103]: E0517 00:41:13.477639 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:13.479843 env[1725]: time="2025-05-17T00:41:13.474048073Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nbcrr,Uid:d6cc48ff-dd4b-4b49-bab8-0ae52ff56cdc,Namespace:calico-system,Attempt:0,} returns sandbox id \"2b4daae0fcbe96958bd2d56f660256b4a0657bac184239c05a0875257d930b51\"" May 17 00:41:13.479843 env[1725]: time="2025-05-17T00:41:13.476264626Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:41:13.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.496582 kernel: audit: type=1400 audit(1747442473.446:469): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.496711 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:41:13.496734 kernel: audit: type=1400 audit(1747442473.446:470): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.496752 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:41:13.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.499558 kernel: audit: type=1400 audit(1747442473.446:471): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit: BPF prog-id=67 op=LOAD May 17 00:41:13.454000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit[2195]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2175 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346461616530666362653936393538626432643536663636303235 May 17 00:41:13.454000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit[2195]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2175 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346461616530666362653936393538626432643536663636303235 May 17 00:41:13.454000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.454000 audit: BPF prog-id=68 op=LOAD May 17 00:41:13.454000 audit[2195]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002131b0 items=0 ppid=2175 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346461616530666362653936393538626432643536663636303235 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit: BPF prog-id=69 op=LOAD May 17 00:41:13.459000 audit[2195]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002131f8 items=0 ppid=2175 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346461616530666362653936393538626432643536663636303235 May 17 00:41:13.459000 audit: BPF prog-id=69 op=UNLOAD May 17 00:41:13.459000 audit: BPF prog-id=68 op=UNLOAD May 17 00:41:13.459000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.459000 audit: BPF prog-id=70 op=LOAD May 17 00:41:13.459000 audit[2195]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000213608 items=0 ppid=2175 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346461616530666362653936393538626432643536663636303235 May 17 00:41:13.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.500000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.500000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2193 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646463643037323134636166323136646239623430396539323731 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2193 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646463643037323134636166323136646239623430396539323731 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit: BPF prog-id=72 op=LOAD May 17 00:41:13.504000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000aa350 items=0 ppid=2193 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646463643037323134636166323136646239623430396539323731 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit: BPF prog-id=73 op=LOAD May 17 00:41:13.504000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000aa398 items=0 ppid=2193 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646463643037323134636166323136646239623430396539323731 May 17 00:41:13.504000 audit: BPF prog-id=73 op=UNLOAD May 17 00:41:13.504000 audit: BPF prog-id=72 op=UNLOAD May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.504000 audit: BPF prog-id=74 op=LOAD May 17 00:41:13.504000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000aa7a8 items=0 ppid=2193 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646463643037323134636166323136646239623430396539323731 May 17 00:41:13.518765 env[1725]: time="2025-05-17T00:41:13.518724324Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r6p5n,Uid:55fac802-1c27-46d9-9d82-9c82e567b3ff,Namespace:kube-system,Attempt:0,} returns sandbox id \"50ddcd07214caf216db9b409e9271ff50f1a65be56581d3c5c10db4b951e4004\"" May 17 00:41:13.629136 kubelet[2103]: E0517 00:41:13.628690 2103 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h2g6f" podUID="c0886405-922a-42c7-b394-b5abf5ec9865" May 17 00:41:14.478339 kubelet[2103]: E0517 00:41:14.478301 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:14.620844 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1408303271.mount: Deactivated successfully. May 17 00:41:14.759668 env[1725]: time="2025-05-17T00:41:14.759399405Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:14.761843 env[1725]: time="2025-05-17T00:41:14.761804320Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:14.763788 env[1725]: time="2025-05-17T00:41:14.763758991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:14.765523 env[1725]: time="2025-05-17T00:41:14.765490711Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:14.766153 env[1725]: time="2025-05-17T00:41:14.766118625Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:41:14.767848 env[1725]: time="2025-05-17T00:41:14.767825699Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\"" May 17 00:41:14.768448 env[1725]: time="2025-05-17T00:41:14.768382596Z" level=info msg="CreateContainer within sandbox \"2b4daae0fcbe96958bd2d56f660256b4a0657bac184239c05a0875257d930b51\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:41:14.782418 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1125582553.mount: Deactivated successfully. May 17 00:41:14.791204 env[1725]: time="2025-05-17T00:41:14.791150259Z" level=info msg="CreateContainer within sandbox \"2b4daae0fcbe96958bd2d56f660256b4a0657bac184239c05a0875257d930b51\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"464e2b7026ab222488a43e4af4f597f38a4aa18ce440b3180d64254fe240e7fa\"" May 17 00:41:14.791881 env[1725]: time="2025-05-17T00:41:14.791848863Z" level=info msg="StartContainer for \"464e2b7026ab222488a43e4af4f597f38a4aa18ce440b3180d64254fe240e7fa\"" May 17 00:41:14.814822 systemd[1]: Started cri-containerd-464e2b7026ab222488a43e4af4f597f38a4aa18ce440b3180d64254fe240e7fa.scope. May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7fa260304ac8 items=0 ppid=2175 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346532623730323661623232323438386134336534616634663539 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit: BPF prog-id=75 op=LOAD May 17 00:41:14.830000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c0003c0038 items=0 ppid=2175 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346532623730323661623232323438386134336534616634663539 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit: BPF prog-id=76 op=LOAD May 17 00:41:14.830000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c0003c0088 items=0 ppid=2175 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346532623730323661623232323438386134336534616634663539 May 17 00:41:14.830000 audit: BPF prog-id=76 op=UNLOAD May 17 00:41:14.830000 audit: BPF prog-id=75 op=UNLOAD May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:14.830000 audit: BPF prog-id=77 op=LOAD May 17 00:41:14.830000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c0003c0118 items=0 ppid=2175 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346532623730323661623232323438386134336534616634663539 May 17 00:41:14.847495 env[1725]: time="2025-05-17T00:41:14.845972390Z" level=info msg="StartContainer for \"464e2b7026ab222488a43e4af4f597f38a4aa18ce440b3180d64254fe240e7fa\" returns successfully" May 17 00:41:14.854474 systemd[1]: cri-containerd-464e2b7026ab222488a43e4af4f597f38a4aa18ce440b3180d64254fe240e7fa.scope: Deactivated successfully. May 17 00:41:14.856000 audit: BPF prog-id=77 op=UNLOAD May 17 00:41:14.930446 env[1725]: time="2025-05-17T00:41:14.930387328Z" level=info msg="shim disconnected" id=464e2b7026ab222488a43e4af4f597f38a4aa18ce440b3180d64254fe240e7fa May 17 00:41:14.930635 env[1725]: time="2025-05-17T00:41:14.930542843Z" level=warning msg="cleaning up after shim disconnected" id=464e2b7026ab222488a43e4af4f597f38a4aa18ce440b3180d64254fe240e7fa namespace=k8s.io May 17 00:41:14.930635 env[1725]: time="2025-05-17T00:41:14.930556821Z" level=info msg="cleaning up dead shim" May 17 00:41:14.938302 env[1725]: time="2025-05-17T00:41:14.938258871Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:41:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2299 runtime=io.containerd.runc.v2\n" May 17 00:41:15.479302 kubelet[2103]: E0517 00:41:15.479253 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:15.625195 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-464e2b7026ab222488a43e4af4f597f38a4aa18ce440b3180d64254fe240e7fa-rootfs.mount: Deactivated successfully. May 17 00:41:15.628290 kubelet[2103]: E0517 00:41:15.627911 2103 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h2g6f" podUID="c0886405-922a-42c7-b394-b5abf5ec9865" May 17 00:41:15.944797 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount216058776.mount: Deactivated successfully. May 17 00:41:16.479711 kubelet[2103]: E0517 00:41:16.479647 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:16.621846 env[1725]: time="2025-05-17T00:41:16.621787652Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:16.623984 env[1725]: time="2025-05-17T00:41:16.623948578Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:16.625774 env[1725]: time="2025-05-17T00:41:16.625741823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:16.627455 env[1725]: time="2025-05-17T00:41:16.627411302Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9dc6553459c3319525ba4090a780db1a133d5dee68c08e07f9b9d6ba83b42a0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:16.627924 env[1725]: time="2025-05-17T00:41:16.627897414Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\" returns image reference \"sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363\"" May 17 00:41:16.630760 env[1725]: time="2025-05-17T00:41:16.630018225Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:41:16.631030 env[1725]: time="2025-05-17T00:41:16.631009393Z" level=info msg="CreateContainer within sandbox \"50ddcd07214caf216db9b409e9271ff50f1a65be56581d3c5c10db4b951e4004\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:41:16.655866 env[1725]: time="2025-05-17T00:41:16.655821700Z" level=info msg="CreateContainer within sandbox \"50ddcd07214caf216db9b409e9271ff50f1a65be56581d3c5c10db4b951e4004\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4dba2bb497e3e7ad74746ce4043b8baa75911c56177fd7c33c1fcaee4e0848de\"" May 17 00:41:16.656573 env[1725]: time="2025-05-17T00:41:16.656547763Z" level=info msg="StartContainer for \"4dba2bb497e3e7ad74746ce4043b8baa75911c56177fd7c33c1fcaee4e0848de\"" May 17 00:41:16.683599 systemd[1]: Started cri-containerd-4dba2bb497e3e7ad74746ce4043b8baa75911c56177fd7c33c1fcaee4e0848de.scope. May 17 00:41:16.696000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.696000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f402458e328 items=0 ppid=2193 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626132626234393765336537616437343734366365343034336238 May 17 00:41:16.696000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.696000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.696000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.696000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.696000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.696000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.696000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.696000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.696000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.696000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.696000 audit: BPF prog-id=78 op=LOAD May 17 00:41:16.696000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002125c8 items=0 ppid=2193 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626132626234393765336537616437343734366365343034336238 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit: BPF prog-id=79 op=LOAD May 17 00:41:16.697000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000212618 items=0 ppid=2193 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626132626234393765336537616437343734366365343034336238 May 17 00:41:16.697000 audit: BPF prog-id=79 op=UNLOAD May 17 00:41:16.697000 audit: BPF prog-id=78 op=UNLOAD May 17 00:41:16.697000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { perfmon } for pid=2326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit[2326]: AVC avc: denied { bpf } for pid=2326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:16.697000 audit: BPF prog-id=80 op=LOAD May 17 00:41:16.697000 audit[2326]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002126a8 items=0 ppid=2193 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626132626234393765336537616437343734366365343034336238 May 17 00:41:16.713637 env[1725]: time="2025-05-17T00:41:16.713569281Z" level=info msg="StartContainer for \"4dba2bb497e3e7ad74746ce4043b8baa75911c56177fd7c33c1fcaee4e0848de\" returns successfully" May 17 00:41:16.830000 audit[2386]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.830000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5637c9b0 a2=0 a3=7fff5637c99c items=0 ppid=2337 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:41:16.830000 audit[2387]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:16.830000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5a628690 a2=0 a3=7fff5a62867c items=0 ppid=2337 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:41:16.833000 audit[2391]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.833000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff362a52a0 a2=0 a3=7fff362a528c items=0 ppid=2337 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.833000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:41:16.833000 audit[2390]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:16.833000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbd03e500 a2=0 a3=7ffcbd03e4ec items=0 ppid=2337 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:41:16.834000 audit[2392]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:16.834000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd35d52eb0 a2=0 a3=7ffd35d52e9c items=0 ppid=2337 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.834000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:41:16.835000 audit[2393]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.835000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd588c3b0 a2=0 a3=7fffd588c39c items=0 ppid=2337 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:41:16.931000 audit[2394]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.931000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdd6d964d0 a2=0 a3=7ffdd6d964bc items=0 ppid=2337 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.931000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:41:16.934000 audit[2396]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.934000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe5ee97d10 a2=0 a3=7ffe5ee97cfc items=0 ppid=2337 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.934000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:41:16.938000 audit[2399]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.938000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd52f15130 a2=0 a3=7ffd52f1511c items=0 ppid=2337 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.938000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:41:16.940000 audit[2400]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.940000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc22fce080 a2=0 a3=7ffc22fce06c items=0 ppid=2337 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:41:16.942000 audit[2402]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.942000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdbec9be30 a2=0 a3=7ffdbec9be1c items=0 ppid=2337 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.942000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:41:16.944000 audit[2403]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.944000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5f85d9a0 a2=0 a3=7ffd5f85d98c items=0 ppid=2337 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.944000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:41:16.947000 audit[2405]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.947000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd44856060 a2=0 a3=7ffd4485604c items=0 ppid=2337 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.947000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:41:16.952000 audit[2408]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.952000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff245e1150 a2=0 a3=7fff245e113c items=0 ppid=2337 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:41:16.954000 audit[2409]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.954000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec32d5320 a2=0 a3=7ffec32d530c items=0 ppid=2337 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.954000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:41:16.957000 audit[2411]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.957000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe688dac60 a2=0 a3=7ffe688dac4c items=0 ppid=2337 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.957000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:41:16.959000 audit[2412]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.959000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9b636b30 a2=0 a3=7ffc9b636b1c items=0 ppid=2337 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.959000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:41:16.962000 audit[2414]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.962000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc883e0d0 a2=0 a3=7ffdc883e0bc items=0 ppid=2337 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:41:16.967000 audit[2417]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.967000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf884a740 a2=0 a3=7ffcf884a72c items=0 ppid=2337 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:41:16.971000 audit[2420]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.971000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd72b6f4a0 a2=0 a3=7ffd72b6f48c items=0 ppid=2337 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:41:16.973000 audit[2421]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.973000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff69f198c0 a2=0 a3=7fff69f198ac items=0 ppid=2337 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:41:16.977000 audit[2423]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:16.977000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff7b999ec0 a2=0 a3=7fff7b999eac items=0 ppid=2337 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:16.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:41:17.002000 audit[2427]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:17.002000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc23f504f0 a2=0 a3=7ffc23f504dc items=0 ppid=2337 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:41:17.004000 audit[2428]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:17.004000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4e078c70 a2=0 a3=7ffe4e078c5c items=0 ppid=2337 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:41:17.007000 audit[2430]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:17.007000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe900c01c0 a2=0 a3=7ffe900c01ac items=0 ppid=2337 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:41:17.034000 audit[2436]: NETFILTER_CFG table=filter:39 family=2 entries=11 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:17.034000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffad15aaa0 a2=0 a3=7fffad15aa8c items=0 ppid=2337 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.034000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:17.056000 audit[2436]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:17.056000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7fffad15aaa0 a2=0 a3=7fffad15aa8c items=0 ppid=2337 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:17.068000 audit[2444]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2444 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.068000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe7e6050a0 a2=0 a3=7ffe7e60508c items=0 ppid=2337 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.068000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:41:17.071000 audit[2446]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2446 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.071000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff6b2123a0 a2=0 a3=7fff6b21238c items=0 ppid=2337 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:41:17.075000 audit[2449]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2449 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.075000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffaf240ef0 a2=0 a3=7fffaf240edc items=0 ppid=2337 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:41:17.076000 audit[2450]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.076000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc03adebf0 a2=0 a3=7ffc03adebdc items=0 ppid=2337 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:41:17.079000 audit[2452]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.079000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdf87c2740 a2=0 a3=7ffdf87c272c items=0 ppid=2337 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:41:17.081000 audit[2453]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.081000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbf08a3a0 a2=0 a3=7ffcbf08a38c items=0 ppid=2337 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.081000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:41:17.084000 audit[2455]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2455 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.084000 audit[2455]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdbd771630 a2=0 a3=7ffdbd77161c items=0 ppid=2337 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:41:17.088000 audit[2458]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2458 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.088000 audit[2458]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff5c2d4c60 a2=0 a3=7fff5c2d4c4c items=0 ppid=2337 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:41:17.090000 audit[2459]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2459 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.090000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb2b48d30 a2=0 a3=7ffeb2b48d1c items=0 ppid=2337 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.090000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:41:17.092000 audit[2461]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.092000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd9327dff0 a2=0 a3=7ffd9327dfdc items=0 ppid=2337 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:41:17.094000 audit[2462]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.094000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeba6c22a0 a2=0 a3=7ffeba6c228c items=0 ppid=2337 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:41:17.096000 audit[2464]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.096000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff14ba0340 a2=0 a3=7fff14ba032c items=0 ppid=2337 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:41:17.100000 audit[2467]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2467 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.100000 audit[2467]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc60503330 a2=0 a3=7ffc6050331c items=0 ppid=2337 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.100000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:41:17.104000 audit[2470]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.104000 audit[2470]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4bc629d0 a2=0 a3=7ffe4bc629bc items=0 ppid=2337 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.104000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:41:17.106000 audit[2471]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.106000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf4a359e0 a2=0 a3=7ffdf4a359cc items=0 ppid=2337 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.106000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:41:17.108000 audit[2473]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.108000 audit[2473]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeaa66fb70 a2=0 a3=7ffeaa66fb5c items=0 ppid=2337 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:41:17.112000 audit[2476]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.112000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd9547d0b0 a2=0 a3=7ffd9547d09c items=0 ppid=2337 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.112000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:41:17.114000 audit[2477]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.114000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0d5bf7d0 a2=0 a3=7ffc0d5bf7bc items=0 ppid=2337 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:41:17.116000 audit[2479]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.116000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcdee2fd70 a2=0 a3=7ffcdee2fd5c items=0 ppid=2337 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:41:17.118000 audit[2480]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.118000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffced4e8680 a2=0 a3=7ffced4e866c items=0 ppid=2337 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.118000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:41:17.121000 audit[2482]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.121000 audit[2482]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd35badf80 a2=0 a3=7ffd35badf6c items=0 ppid=2337 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:41:17.124000 audit[2485]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:17.124000 audit[2485]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe9f2d4360 a2=0 a3=7ffe9f2d434c items=0 ppid=2337 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:41:17.128000 audit[2487]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:41:17.128000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd50571360 a2=0 a3=7ffd5057134c items=0 ppid=2337 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.128000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:17.129000 audit[2487]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:41:17.129000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd50571360 a2=0 a3=7ffd5057134c items=0 ppid=2337 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:17.129000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:17.481108 kubelet[2103]: E0517 00:41:17.480981 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:17.628164 kubelet[2103]: E0517 00:41:17.628119 2103 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h2g6f" podUID="c0886405-922a-42c7-b394-b5abf5ec9865" May 17 00:41:17.681802 kubelet[2103]: I0517 00:41:17.681614 2103 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-r6p5n" podStartSLOduration=4.572479235 podStartE2EDuration="7.681596418s" podCreationTimestamp="2025-05-17 00:41:10 +0000 UTC" firstStartedPulling="2025-05-17 00:41:13.520231077 +0000 UTC m=+3.590906784" lastFinishedPulling="2025-05-17 00:41:16.629348264 +0000 UTC m=+6.700023967" observedRunningTime="2025-05-17 00:41:17.681463248 +0000 UTC m=+7.752138967" watchObservedRunningTime="2025-05-17 00:41:17.681596418 +0000 UTC m=+7.752272194" May 17 00:41:18.482148 kubelet[2103]: E0517 00:41:18.482103 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:18.748410 amazon-ssm-agent[1698]: 2025-05-17 00:41:18 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. May 17 00:41:19.483107 kubelet[2103]: E0517 00:41:19.483064 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:19.628747 kubelet[2103]: E0517 00:41:19.628698 2103 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h2g6f" podUID="c0886405-922a-42c7-b394-b5abf5ec9865" May 17 00:41:19.781491 env[1725]: time="2025-05-17T00:41:19.781160480Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:19.784053 env[1725]: time="2025-05-17T00:41:19.784015818Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:19.785907 env[1725]: time="2025-05-17T00:41:19.785870969Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:19.787646 env[1725]: time="2025-05-17T00:41:19.787619726Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:19.788031 env[1725]: time="2025-05-17T00:41:19.787999298Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:41:19.790151 env[1725]: time="2025-05-17T00:41:19.790122541Z" level=info msg="CreateContainer within sandbox \"2b4daae0fcbe96958bd2d56f660256b4a0657bac184239c05a0875257d930b51\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:41:19.810227 env[1725]: time="2025-05-17T00:41:19.810182064Z" level=info msg="CreateContainer within sandbox \"2b4daae0fcbe96958bd2d56f660256b4a0657bac184239c05a0875257d930b51\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2f0f9919ccfdd322a1be57203826e1447d9e00ad2ae817f606f7e5511a7fec25\"" May 17 00:41:19.810825 env[1725]: time="2025-05-17T00:41:19.810795045Z" level=info msg="StartContainer for \"2f0f9919ccfdd322a1be57203826e1447d9e00ad2ae817f606f7e5511a7fec25\"" May 17 00:41:19.840766 systemd[1]: run-containerd-runc-k8s.io-2f0f9919ccfdd322a1be57203826e1447d9e00ad2ae817f606f7e5511a7fec25-runc.DL0f83.mount: Deactivated successfully. May 17 00:41:19.846922 systemd[1]: Started cri-containerd-2f0f9919ccfdd322a1be57203826e1447d9e00ad2ae817f606f7e5511a7fec25.scope. May 17 00:41:19.871214 kernel: kauditd_printk_skb: 346 callbacks suppressed May 17 00:41:19.871371 kernel: audit: type=1400 audit(1747442479.861:563): avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.861000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.861000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f941d22f7b8 items=0 ppid=2175 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:19.887658 kernel: audit: type=1300 audit(1747442479.861:563): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f941d22f7b8 items=0 ppid=2175 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:19.887772 kernel: audit: type=1327 audit(1747442479.861:563): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306639393139636366646433323261316265353732303338323665 May 17 00:41:19.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306639393139636366646433323261316265353732303338323665 May 17 00:41:19.861000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.895263 kernel: audit: type=1400 audit(1747442479.861:564): avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.861000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.902041 kernel: audit: type=1400 audit(1747442479.861:564): avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.861000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.911697 kernel: audit: type=1400 audit(1747442479.861:564): avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.911820 kernel: audit: type=1400 audit(1747442479.861:564): avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.861000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.923363 kernel: audit: type=1400 audit(1747442479.861:564): avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.861000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.923904 env[1725]: time="2025-05-17T00:41:19.923854420Z" level=info msg="StartContainer for \"2f0f9919ccfdd322a1be57203826e1447d9e00ad2ae817f606f7e5511a7fec25\" returns successfully" May 17 00:41:19.861000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.938108 kernel: audit: type=1400 audit(1747442479.861:564): avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.938223 kernel: audit: type=1400 audit(1747442479.861:564): avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.861000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.861000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.861000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.861000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.861000 audit: BPF prog-id=81 op=LOAD May 17 00:41:19.861000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003ca298 items=0 ppid=2175 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:19.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306639393139636366646433323261316265353732303338323665 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit: BPF prog-id=82 op=LOAD May 17 00:41:19.869000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003ca2e8 items=0 ppid=2175 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:19.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306639393139636366646433323261316265353732303338323665 May 17 00:41:19.869000 audit: BPF prog-id=82 op=UNLOAD May 17 00:41:19.869000 audit: BPF prog-id=81 op=UNLOAD May 17 00:41:19.869000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:19.869000 audit: BPF prog-id=83 op=LOAD May 17 00:41:19.869000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ca378 items=0 ppid=2175 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:19.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266306639393139636366646433323261316265353732303338323665 May 17 00:41:20.483492 kubelet[2103]: E0517 00:41:20.483445 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:20.603020 env[1725]: time="2025-05-17T00:41:20.602962365Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:41:20.604741 systemd[1]: cri-containerd-2f0f9919ccfdd322a1be57203826e1447d9e00ad2ae817f606f7e5511a7fec25.scope: Deactivated successfully. May 17 00:41:20.608000 audit: BPF prog-id=83 op=UNLOAD May 17 00:41:20.639469 kubelet[2103]: I0517 00:41:20.638907 2103 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:41:20.801155 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2f0f9919ccfdd322a1be57203826e1447d9e00ad2ae817f606f7e5511a7fec25-rootfs.mount: Deactivated successfully. May 17 00:41:21.070424 env[1725]: time="2025-05-17T00:41:21.070304635Z" level=info msg="shim disconnected" id=2f0f9919ccfdd322a1be57203826e1447d9e00ad2ae817f606f7e5511a7fec25 May 17 00:41:21.070424 env[1725]: time="2025-05-17T00:41:21.070349455Z" level=warning msg="cleaning up after shim disconnected" id=2f0f9919ccfdd322a1be57203826e1447d9e00ad2ae817f606f7e5511a7fec25 namespace=k8s.io May 17 00:41:21.070424 env[1725]: time="2025-05-17T00:41:21.070358391Z" level=info msg="cleaning up dead shim" May 17 00:41:21.078124 env[1725]: time="2025-05-17T00:41:21.078081362Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:41:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2539 runtime=io.containerd.runc.v2\n" May 17 00:41:21.484244 kubelet[2103]: E0517 00:41:21.484122 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:21.632599 systemd[1]: Created slice kubepods-besteffort-podc0886405_922a_42c7_b394_b5abf5ec9865.slice. May 17 00:41:21.635170 env[1725]: time="2025-05-17T00:41:21.635133723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h2g6f,Uid:c0886405-922a-42c7-b394-b5abf5ec9865,Namespace:calico-system,Attempt:0,}" May 17 00:41:21.676636 env[1725]: time="2025-05-17T00:41:21.676597713Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:41:21.713855 env[1725]: time="2025-05-17T00:41:21.713779975Z" level=error msg="Failed to destroy network for sandbox \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:21.716025 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc-shm.mount: Deactivated successfully. May 17 00:41:21.716848 env[1725]: time="2025-05-17T00:41:21.716746844Z" level=error msg="encountered an error cleaning up failed sandbox \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:21.717223 env[1725]: time="2025-05-17T00:41:21.717016127Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h2g6f,Uid:c0886405-922a-42c7-b394-b5abf5ec9865,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:21.717875 kubelet[2103]: E0517 00:41:21.717837 2103 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:21.717984 kubelet[2103]: E0517 00:41:21.717908 2103 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h2g6f" May 17 00:41:21.717984 kubelet[2103]: E0517 00:41:21.717938 2103 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h2g6f" May 17 00:41:21.718085 kubelet[2103]: E0517 00:41:21.717995 2103 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-h2g6f_calico-system(c0886405-922a-42c7-b394-b5abf5ec9865)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-h2g6f_calico-system(c0886405-922a-42c7-b394-b5abf5ec9865)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h2g6f" podUID="c0886405-922a-42c7-b394-b5abf5ec9865" May 17 00:41:22.485328 kubelet[2103]: E0517 00:41:22.485271 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:22.676949 kubelet[2103]: I0517 00:41:22.676911 2103 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:41:22.677854 env[1725]: time="2025-05-17T00:41:22.677820076Z" level=info msg="StopPodSandbox for \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\"" May 17 00:41:22.734782 env[1725]: time="2025-05-17T00:41:22.734720207Z" level=error msg="StopPodSandbox for \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\" failed" error="failed to destroy network for sandbox \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:22.735792 kubelet[2103]: E0517 00:41:22.735150 2103 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:41:22.735792 kubelet[2103]: E0517 00:41:22.735229 2103 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc"} May 17 00:41:22.735792 kubelet[2103]: E0517 00:41:22.735297 2103 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c0886405-922a-42c7-b394-b5abf5ec9865\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:41:22.735792 kubelet[2103]: E0517 00:41:22.735331 2103 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c0886405-922a-42c7-b394-b5abf5ec9865\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h2g6f" podUID="c0886405-922a-42c7-b394-b5abf5ec9865" May 17 00:41:23.478000 audit[2594]: NETFILTER_CFG table=filter:65 family=2 entries=20 op=nft_register_rule pid=2594 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:23.478000 audit[2594]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc803652d0 a2=0 a3=7ffc803652bc items=0 ppid=2337 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:23.478000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:23.485737 kubelet[2103]: E0517 00:41:23.485687 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:23.484000 audit[2594]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=2594 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:23.484000 audit[2594]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc803652d0 a2=0 a3=0 items=0 ppid=2337 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:23.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:24.485907 kubelet[2103]: E0517 00:41:24.485784 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:25.467000 audit[2596]: NETFILTER_CFG table=filter:67 family=2 entries=19 op=nft_register_rule pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:25.471282 kernel: kauditd_printk_skb: 40 callbacks suppressed May 17 00:41:25.471398 kernel: audit: type=1325 audit(1747442485.467:572): table=filter:67 family=2 entries=19 op=nft_register_rule pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:25.467000 audit[2596]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc8be329d0 a2=0 a3=7ffc8be329bc items=0 ppid=2337 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:25.485784 kernel: audit: type=1300 audit(1747442485.467:572): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc8be329d0 a2=0 a3=7ffc8be329bc items=0 ppid=2337 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:25.486064 kubelet[2103]: E0517 00:41:25.485987 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:25.492485 kernel: audit: type=1327 audit(1747442485.467:572): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:25.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:25.490000 audit[2596]: NETFILTER_CFG table=nat:68 family=2 entries=21 op=nft_register_chain pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:25.508181 kernel: audit: type=1325 audit(1747442485.490:573): table=nat:68 family=2 entries=21 op=nft_register_chain pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:25.508305 kernel: audit: type=1300 audit(1747442485.490:573): arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffc8be329d0 a2=0 a3=7ffc8be329bc items=0 ppid=2337 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:25.490000 audit[2596]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffc8be329d0 a2=0 a3=7ffc8be329bc items=0 ppid=2337 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:25.490000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:25.514489 kernel: audit: type=1327 audit(1747442485.490:573): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:26.361364 kernel: audit: type=1325 audit(1747442486.345:574): table=filter:69 family=2 entries=15 op=nft_register_rule pid=2598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:26.361522 kernel: audit: type=1300 audit(1747442486.345:574): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffd7665740 a2=0 a3=7fffd766572c items=0 ppid=2337 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:26.345000 audit[2598]: NETFILTER_CFG table=filter:69 family=2 entries=15 op=nft_register_rule pid=2598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:26.345000 audit[2598]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffd7665740 a2=0 a3=7fffd766572c items=0 ppid=2337 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:26.367718 systemd[1]: Created slice kubepods-besteffort-pod8b92dfa6_8a61_41b6_965a_26f80820187b.slice. May 17 00:41:26.381043 kernel: audit: type=1327 audit(1747442486.345:574): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:26.381173 kernel: audit: type=1325 audit(1747442486.362:575): table=nat:70 family=2 entries=37 op=nft_register_chain pid=2598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:26.345000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:26.362000 audit[2598]: NETFILTER_CFG table=nat:70 family=2 entries=37 op=nft_register_chain pid=2598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:26.362000 audit[2598]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7fffd7665740 a2=0 a3=7fffd766572c items=0 ppid=2337 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:26.362000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:26.422000 audit[2600]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=2600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:26.422000 audit[2600]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe34c89430 a2=0 a3=7ffe34c8941c items=0 ppid=2337 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:26.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:26.463000 audit[2600]: NETFILTER_CFG table=nat:72 family=2 entries=58 op=nft_register_chain pid=2600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:26.463000 audit[2600]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffe34c89430 a2=0 a3=7ffe34c8941c items=0 ppid=2337 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:26.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:26.486372 kubelet[2103]: E0517 00:41:26.486317 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:26.497820 kubelet[2103]: I0517 00:41:26.497727 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l8dj9\" (UniqueName: \"kubernetes.io/projected/8b92dfa6-8a61-41b6-965a-26f80820187b-kube-api-access-l8dj9\") pod \"nginx-deployment-7fcdb87857-zh7tm\" (UID: \"8b92dfa6-8a61-41b6-965a-26f80820187b\") " pod="default/nginx-deployment-7fcdb87857-zh7tm" May 17 00:41:26.685822 env[1725]: time="2025-05-17T00:41:26.684410061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zh7tm,Uid:8b92dfa6-8a61-41b6-965a-26f80820187b,Namespace:default,Attempt:0,}" May 17 00:41:26.864877 env[1725]: time="2025-05-17T00:41:26.864798642Z" level=error msg="Failed to destroy network for sandbox \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:26.865572 env[1725]: time="2025-05-17T00:41:26.865519986Z" level=error msg="encountered an error cleaning up failed sandbox \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:26.865851 env[1725]: time="2025-05-17T00:41:26.865802357Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zh7tm,Uid:8b92dfa6-8a61-41b6-965a-26f80820187b,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:26.866458 kubelet[2103]: E0517 00:41:26.866220 2103 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:26.866458 kubelet[2103]: E0517 00:41:26.866302 2103 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-zh7tm" May 17 00:41:26.866458 kubelet[2103]: E0517 00:41:26.866333 2103 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-zh7tm" May 17 00:41:26.866677 kubelet[2103]: E0517 00:41:26.866389 2103 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-zh7tm_default(8b92dfa6-8a61-41b6-965a-26f80820187b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-zh7tm_default(8b92dfa6-8a61-41b6-965a-26f80820187b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-zh7tm" podUID="8b92dfa6-8a61-41b6-965a-26f80820187b" May 17 00:41:26.867576 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304-shm.mount: Deactivated successfully. May 17 00:41:27.487493 kubelet[2103]: E0517 00:41:27.487415 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:27.686464 kubelet[2103]: I0517 00:41:27.686159 2103 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:41:27.687236 env[1725]: time="2025-05-17T00:41:27.687199920Z" level=info msg="StopPodSandbox for \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\"" May 17 00:41:27.743277 env[1725]: time="2025-05-17T00:41:27.742843495Z" level=error msg="StopPodSandbox for \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\" failed" error="failed to destroy network for sandbox \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:27.743450 kubelet[2103]: E0517 00:41:27.743100 2103 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:41:27.743450 kubelet[2103]: E0517 00:41:27.743166 2103 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304"} May 17 00:41:27.743450 kubelet[2103]: E0517 00:41:27.743210 2103 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8b92dfa6-8a61-41b6-965a-26f80820187b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:41:27.743450 kubelet[2103]: E0517 00:41:27.743241 2103 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8b92dfa6-8a61-41b6-965a-26f80820187b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-zh7tm" podUID="8b92dfa6-8a61-41b6-965a-26f80820187b" May 17 00:41:27.767089 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3426953564.mount: Deactivated successfully. May 17 00:41:27.794996 env[1725]: time="2025-05-17T00:41:27.794947271Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:27.796810 env[1725]: time="2025-05-17T00:41:27.796767321Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:27.798653 env[1725]: time="2025-05-17T00:41:27.798598159Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:27.800581 env[1725]: time="2025-05-17T00:41:27.800544507Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:27.800934 env[1725]: time="2025-05-17T00:41:27.800904686Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:41:27.815607 env[1725]: time="2025-05-17T00:41:27.815566242Z" level=info msg="CreateContainer within sandbox \"2b4daae0fcbe96958bd2d56f660256b4a0657bac184239c05a0875257d930b51\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:41:27.831906 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount908608367.mount: Deactivated successfully. May 17 00:41:27.842572 env[1725]: time="2025-05-17T00:41:27.842514345Z" level=info msg="CreateContainer within sandbox \"2b4daae0fcbe96958bd2d56f660256b4a0657bac184239c05a0875257d930b51\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"3d2720a5d725620a80bee3ca06a638d61cc58683caf277bb268c16457a60d694\"" May 17 00:41:27.843185 env[1725]: time="2025-05-17T00:41:27.843151866Z" level=info msg="StartContainer for \"3d2720a5d725620a80bee3ca06a638d61cc58683caf277bb268c16457a60d694\"" May 17 00:41:27.859506 systemd[1]: Started cri-containerd-3d2720a5d725620a80bee3ca06a638d61cc58683caf277bb268c16457a60d694.scope. May 17 00:41:27.876000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.876000 audit[2658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb36b46efe8 items=0 ppid=2175 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:27.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323732306135643732353632306138306265653363613036613633 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit: BPF prog-id=84 op=LOAD May 17 00:41:27.877000 audit[2658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000257d78 items=0 ppid=2175 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:27.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323732306135643732353632306138306265653363613036613633 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit: BPF prog-id=85 op=LOAD May 17 00:41:27.877000 audit[2658]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000257dc8 items=0 ppid=2175 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:27.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323732306135643732353632306138306265653363613036613633 May 17 00:41:27.877000 audit: BPF prog-id=85 op=UNLOAD May 17 00:41:27.877000 audit: BPF prog-id=84 op=UNLOAD May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:27.877000 audit: BPF prog-id=86 op=LOAD May 17 00:41:27.877000 audit[2658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000257e58 items=0 ppid=2175 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:27.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323732306135643732353632306138306265653363613036613633 May 17 00:41:27.896187 env[1725]: time="2025-05-17T00:41:27.896136943Z" level=info msg="StartContainer for \"3d2720a5d725620a80bee3ca06a638d61cc58683caf277bb268c16457a60d694\" returns successfully" May 17 00:41:28.011362 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:41:28.011615 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:41:28.487979 kubelet[2103]: E0517 00:41:28.487928 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:28.720340 kubelet[2103]: I0517 00:41:28.720275 2103 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-nbcrr" podStartSLOduration=4.393975373 podStartE2EDuration="18.720259054s" podCreationTimestamp="2025-05-17 00:41:10 +0000 UTC" firstStartedPulling="2025-05-17 00:41:13.475676887 +0000 UTC m=+3.546352590" lastFinishedPulling="2025-05-17 00:41:27.801960555 +0000 UTC m=+17.872636271" observedRunningTime="2025-05-17 00:41:28.719476389 +0000 UTC m=+18.790152110" watchObservedRunningTime="2025-05-17 00:41:28.720259054 +0000 UTC m=+18.790934760" May 17 00:41:29.489183 kubelet[2103]: E0517 00:41:29.489105 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:29.511000 audit[2774]: AVC avc: denied { write } for pid=2774 comm="tee" name="fd" dev="proc" ino=19679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:29.511000 audit[2774]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc6eb67e8 a2=241 a3=1b6 items=1 ppid=2746 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:29.511000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:41:29.511000 audit: PATH item=0 name="/dev/fd/63" inode=20755 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:29.511000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:29.520000 audit[2771]: AVC avc: denied { write } for pid=2771 comm="tee" name="fd" dev="proc" ino=19683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:29.520000 audit[2771]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd193a27ea a2=241 a3=1b6 items=1 ppid=2740 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:29.520000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:41:29.520000 audit: PATH item=0 name="/dev/fd/63" inode=19675 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:29.520000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:29.536000 audit[2779]: AVC avc: denied { write } for pid=2779 comm="tee" name="fd" dev="proc" ino=20766 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:29.536000 audit[2779]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcff9cf7d8 a2=241 a3=1b6 items=1 ppid=2756 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:29.536000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:41:29.536000 audit: PATH item=0 name="/dev/fd/63" inode=20762 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:29.536000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:29.546000 audit[2787]: AVC avc: denied { write } for pid=2787 comm="tee" name="fd" dev="proc" ino=19700 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:29.546000 audit[2787]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb18117e8 a2=241 a3=1b6 items=1 ppid=2748 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:29.546000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:41:29.546000 audit: PATH item=0 name="/dev/fd/63" inode=19688 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:29.546000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:29.548000 audit[2791]: AVC avc: denied { write } for pid=2791 comm="tee" name="fd" dev="proc" ino=19704 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:29.548000 audit[2791]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc438c7e8 a2=241 a3=1b6 items=1 ppid=2749 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:29.548000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:41:29.548000 audit: PATH item=0 name="/dev/fd/63" inode=20765 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:29.548000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:29.570000 audit[2814]: AVC avc: denied { write } for pid=2814 comm="tee" name="fd" dev="proc" ino=20773 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:29.574000 audit[2809]: AVC avc: denied { write } for pid=2809 comm="tee" name="fd" dev="proc" ino=20776 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:29.574000 audit[2809]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5ca4e7d9 a2=241 a3=1b6 items=1 ppid=2751 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:29.574000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:41:29.574000 audit: PATH item=0 name="/dev/fd/63" inode=19697 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:29.574000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:29.570000 audit[2814]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc42f127e9 a2=241 a3=1b6 items=1 ppid=2741 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:29.570000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:41:29.570000 audit: PATH item=0 name="/dev/fd/63" inode=19707 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:29.570000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:29.726546 systemd[1]: run-containerd-runc-k8s.io-3d2720a5d725620a80bee3ca06a638d61cc58683caf277bb268c16457a60d694-runc.eA10sS.mount: Deactivated successfully. May 17 00:41:29.922000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.922000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.922000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.922000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.922000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.922000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.922000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.922000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.922000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.922000 audit: BPF prog-id=87 op=LOAD May 17 00:41:29.922000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffefa5b58a0 a2=98 a3=3 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:29.922000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:29.922000 audit: BPF prog-id=87 op=UNLOAD May 17 00:41:29.923000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit: BPF prog-id=88 op=LOAD May 17 00:41:29.923000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffefa5b5690 a2=94 a3=54428f items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:29.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:29.923000 audit: BPF prog-id=88 op=UNLOAD May 17 00:41:29.923000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:29.923000 audit: BPF prog-id=89 op=LOAD May 17 00:41:29.923000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffefa5b56c0 a2=94 a3=2 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:29.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:29.923000 audit: BPF prog-id=89 op=UNLOAD May 17 00:41:30.051000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.051000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.051000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.051000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.051000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.051000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.051000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.051000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.051000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.051000 audit: BPF prog-id=90 op=LOAD May 17 00:41:30.051000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffefa5b5580 a2=94 a3=1 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.051000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.051000 audit: BPF prog-id=90 op=UNLOAD May 17 00:41:30.051000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.051000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffefa5b5650 a2=50 a3=7ffefa5b5730 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.051000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.062000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.062000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefa5b5590 a2=28 a3=0 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.062000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.062000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.062000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffefa5b55c0 a2=28 a3=0 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.062000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.062000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.062000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffefa5b54d0 a2=28 a3=0 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.062000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.062000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.062000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefa5b55e0 a2=28 a3=0 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.062000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.062000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.062000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefa5b55c0 a2=28 a3=0 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.062000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.062000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.062000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefa5b55b0 a2=28 a3=0 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.062000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.062000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.062000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefa5b55e0 a2=28 a3=0 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.062000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.062000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.062000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffefa5b55c0 a2=28 a3=0 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.062000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.062000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.062000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffefa5b55e0 a2=28 a3=0 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.062000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.062000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.062000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffefa5b55b0 a2=28 a3=0 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.062000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.063000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefa5b5620 a2=28 a3=0 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.063000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.063000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffefa5b53d0 a2=50 a3=1 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.063000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.063000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit: BPF prog-id=91 op=LOAD May 17 00:41:30.063000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffefa5b53d0 a2=94 a3=5 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.063000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.063000 audit: BPF prog-id=91 op=UNLOAD May 17 00:41:30.063000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffefa5b5480 a2=50 a3=1 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.063000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.063000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffefa5b55a0 a2=4 a3=38 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.063000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.063000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.063000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:30.063000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffefa5b55f0 a2=94 a3=6 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.063000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.064000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:30.064000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffefa5b4da0 a2=94 a3=88 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.064000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.064000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.064000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffefa5b4da0 a2=94 a3=88 items=0 ppid=2750 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.064000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.074000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit: BPF prog-id=92 op=LOAD May 17 00:41:30.074000 audit[2874]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcceaf95b0 a2=98 a3=1999999999999999 items=0 ppid=2750 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.074000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:41:30.074000 audit: BPF prog-id=92 op=UNLOAD May 17 00:41:30.074000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit: BPF prog-id=93 op=LOAD May 17 00:41:30.074000 audit[2874]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcceaf9490 a2=94 a3=ffff items=0 ppid=2750 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.074000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:41:30.074000 audit: BPF prog-id=93 op=UNLOAD May 17 00:41:30.074000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.074000 audit: BPF prog-id=94 op=LOAD May 17 00:41:30.074000 audit[2874]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcceaf94d0 a2=94 a3=7ffcceaf96b0 items=0 ppid=2750 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.074000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:41:30.075000 audit: BPF prog-id=94 op=UNLOAD May 17 00:41:30.140997 (udev-worker)[2888]: Network interface NamePolicy= disabled on kernel command line. May 17 00:41:30.143496 systemd-networkd[1442]: vxlan.calico: Link UP May 17 00:41:30.143503 systemd-networkd[1442]: vxlan.calico: Gained carrier May 17 00:41:30.168669 (udev-worker)[2602]: Network interface NamePolicy= disabled on kernel command line. May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit: BPF prog-id=95 op=LOAD May 17 00:41:30.166000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc11854170 a2=98 a3=0 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.166000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.166000 audit: BPF prog-id=95 op=UNLOAD May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit: BPF prog-id=96 op=LOAD May 17 00:41:30.166000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc11853f80 a2=94 a3=54428f items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.166000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.166000 audit: BPF prog-id=96 op=UNLOAD May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit: BPF prog-id=97 op=LOAD May 17 00:41:30.166000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc11853fb0 a2=94 a3=2 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.166000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.166000 audit: BPF prog-id=97 op=UNLOAD May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc11853e80 a2=28 a3=0 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.166000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc11853eb0 a2=28 a3=0 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.166000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc11853dc0 a2=28 a3=0 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.166000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc11853ed0 a2=28 a3=0 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.166000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc11853eb0 a2=28 a3=0 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.166000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.166000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.166000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc11853ea0 a2=28 a3=0 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.166000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc11853ed0 a2=28 a3=0 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc11853eb0 a2=28 a3=0 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc11853ed0 a2=28 a3=0 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc11853ea0 a2=28 a3=0 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc11853f10 a2=28 a3=0 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit: BPF prog-id=98 op=LOAD May 17 00:41:30.168000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc11853d80 a2=94 a3=0 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.168000 audit: BPF prog-id=98 op=UNLOAD May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc11853d70 a2=50 a3=2800 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc11853d70 a2=50 a3=2800 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit: BPF prog-id=99 op=LOAD May 17 00:41:30.168000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc11853590 a2=94 a3=2 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.168000 audit: BPF prog-id=99 op=UNLOAD May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.168000 audit: BPF prog-id=100 op=LOAD May 17 00:41:30.168000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc11853690 a2=94 a3=30 items=0 ppid=2750 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit: BPF prog-id=101 op=LOAD May 17 00:41:30.174000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1c8d28c0 a2=98 a3=0 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.174000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.174000 audit: BPF prog-id=101 op=UNLOAD May 17 00:41:30.174000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit: BPF prog-id=102 op=LOAD May 17 00:41:30.174000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1c8d26b0 a2=94 a3=54428f items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.174000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.174000 audit: BPF prog-id=102 op=UNLOAD May 17 00:41:30.174000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.174000 audit: BPF prog-id=103 op=LOAD May 17 00:41:30.174000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1c8d26e0 a2=94 a3=2 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.174000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.174000 audit: BPF prog-id=103 op=UNLOAD May 17 00:41:30.296000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.296000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.296000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.296000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.296000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.296000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.296000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.296000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.296000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.296000 audit: BPF prog-id=104 op=LOAD May 17 00:41:30.296000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1c8d25a0 a2=94 a3=1 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.296000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.296000 audit: BPF prog-id=104 op=UNLOAD May 17 00:41:30.296000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.296000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd1c8d2670 a2=50 a3=7ffd1c8d2750 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.296000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.307000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.307000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1c8d25b0 a2=28 a3=0 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.307000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.307000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1c8d25e0 a2=28 a3=0 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.307000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.307000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1c8d24f0 a2=28 a3=0 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.307000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.307000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1c8d2600 a2=28 a3=0 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.307000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.307000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1c8d25e0 a2=28 a3=0 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.307000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.307000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1c8d25d0 a2=28 a3=0 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.307000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.307000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1c8d2600 a2=28 a3=0 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.307000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.307000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1c8d25e0 a2=28 a3=0 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.307000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.307000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1c8d2600 a2=28 a3=0 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.307000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.307000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1c8d25d0 a2=28 a3=0 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.307000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.307000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1c8d2640 a2=28 a3=0 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd1c8d23f0 a2=50 a3=1 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit: BPF prog-id=105 op=LOAD May 17 00:41:30.308000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd1c8d23f0 a2=94 a3=5 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.308000 audit: BPF prog-id=105 op=UNLOAD May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd1c8d24a0 a2=50 a3=1 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd1c8d25c0 a2=4 a3=38 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { confidentiality } for pid=2904 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:30.308000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd1c8d2610 a2=94 a3=6 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { confidentiality } for pid=2904 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:30.308000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd1c8d1dc0 a2=94 a3=88 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.308000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd1c8d1dc0 a2=94 a3=88 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.309000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.309000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd1c8d37f0 a2=10 a3=f8f00800 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.309000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.309000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.309000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd1c8d3690 a2=10 a3=3 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.309000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.310000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.310000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd1c8d3630 a2=10 a3=3 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.310000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.310000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.310000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd1c8d3630 a2=10 a3=7 items=0 ppid=2750 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.310000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:30.318000 audit: BPF prog-id=100 op=UNLOAD May 17 00:41:30.401000 audit[2929]: NETFILTER_CFG table=mangle:73 family=2 entries=16 op=nft_register_chain pid=2929 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:30.401000 audit[2929]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffda40e1040 a2=0 a3=7ffda40e102c items=0 ppid=2750 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.401000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:30.405000 audit[2927]: NETFILTER_CFG table=nat:74 family=2 entries=15 op=nft_register_chain pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:30.405000 audit[2927]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd95fae150 a2=0 a3=7ffd95fae13c items=0 ppid=2750 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.405000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:30.411000 audit[2932]: NETFILTER_CFG table=filter:75 family=2 entries=39 op=nft_register_chain pid=2932 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:30.411000 audit[2932]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffdcdb1b1e0 a2=0 a3=7ffdcdb1b1cc items=0 ppid=2750 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.411000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:30.413000 audit[2926]: NETFILTER_CFG table=raw:76 family=2 entries=21 op=nft_register_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:30.413000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffedebf0810 a2=0 a3=7ffedebf07fc items=0 ppid=2750 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.413000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:30.462774 kubelet[2103]: E0517 00:41:30.462652 2103 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:30.489389 kubelet[2103]: E0517 00:41:30.489337 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:30.716414 systemd[1]: run-containerd-runc-k8s.io-3d2720a5d725620a80bee3ca06a638d61cc58683caf277bb268c16457a60d694-runc.5pqDYj.mount: Deactivated successfully. May 17 00:41:31.490313 kubelet[2103]: E0517 00:41:31.490267 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:31.995614 systemd-networkd[1442]: vxlan.calico: Gained IPv6LL May 17 00:41:32.490637 kubelet[2103]: E0517 00:41:32.490537 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:33.152225 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 17 00:41:33.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:33.154468 kernel: kauditd_printk_skb: 578 callbacks suppressed May 17 00:41:33.154550 kernel: audit: type=1131 audit(1747442493.151:686): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:33.173000 audit: BPF prog-id=59 op=UNLOAD May 17 00:41:33.173000 audit: BPF prog-id=58 op=UNLOAD May 17 00:41:33.177230 kernel: audit: type=1334 audit(1747442493.173:687): prog-id=59 op=UNLOAD May 17 00:41:33.177371 kernel: audit: type=1334 audit(1747442493.173:688): prog-id=58 op=UNLOAD May 17 00:41:33.177444 kernel: audit: type=1334 audit(1747442493.173:689): prog-id=57 op=UNLOAD May 17 00:41:33.173000 audit: BPF prog-id=57 op=UNLOAD May 17 00:41:33.490998 kubelet[2103]: E0517 00:41:33.490890 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:34.491164 kubelet[2103]: E0517 00:41:34.491124 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:35.491738 kubelet[2103]: E0517 00:41:35.491695 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:36.492561 kubelet[2103]: E0517 00:41:36.492510 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:36.629344 env[1725]: time="2025-05-17T00:41:36.629301929Z" level=info msg="StopPodSandbox for \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\"" May 17 00:41:36.983829 env[1725]: 2025-05-17 00:41:36.746 [INFO][2983] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:41:36.983829 env[1725]: 2025-05-17 00:41:36.748 [INFO][2983] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" iface="eth0" netns="/var/run/netns/cni-e9644013-875a-34e2-7748-a2ae3ce2c2a6" May 17 00:41:36.983829 env[1725]: 2025-05-17 00:41:36.748 [INFO][2983] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" iface="eth0" netns="/var/run/netns/cni-e9644013-875a-34e2-7748-a2ae3ce2c2a6" May 17 00:41:36.983829 env[1725]: 2025-05-17 00:41:36.749 [INFO][2983] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" iface="eth0" netns="/var/run/netns/cni-e9644013-875a-34e2-7748-a2ae3ce2c2a6" May 17 00:41:36.983829 env[1725]: 2025-05-17 00:41:36.749 [INFO][2983] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:41:36.983829 env[1725]: 2025-05-17 00:41:36.749 [INFO][2983] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:41:36.983829 env[1725]: 2025-05-17 00:41:36.966 [INFO][2990] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" HandleID="k8s-pod-network.a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" Workload="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:41:36.983829 env[1725]: 2025-05-17 00:41:36.966 [INFO][2990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:36.983829 env[1725]: 2025-05-17 00:41:36.967 [INFO][2990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:36.983829 env[1725]: 2025-05-17 00:41:36.978 [WARNING][2990] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" HandleID="k8s-pod-network.a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" Workload="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:41:36.983829 env[1725]: 2025-05-17 00:41:36.978 [INFO][2990] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" HandleID="k8s-pod-network.a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" Workload="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:41:36.983829 env[1725]: 2025-05-17 00:41:36.980 [INFO][2990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:36.983829 env[1725]: 2025-05-17 00:41:36.982 [INFO][2983] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:41:36.985838 systemd[1]: run-netns-cni\x2de9644013\x2d875a\x2d34e2\x2d7748\x2da2ae3ce2c2a6.mount: Deactivated successfully. May 17 00:41:36.987006 env[1725]: time="2025-05-17T00:41:36.986963021Z" level=info msg="TearDown network for sandbox \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\" successfully" May 17 00:41:36.987006 env[1725]: time="2025-05-17T00:41:36.986999362Z" level=info msg="StopPodSandbox for \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\" returns successfully" May 17 00:41:36.987760 env[1725]: time="2025-05-17T00:41:36.987664179Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h2g6f,Uid:c0886405-922a-42c7-b394-b5abf5ec9865,Namespace:calico-system,Attempt:1,}" May 17 00:41:37.149098 systemd-networkd[1442]: calif36255af94c: Link UP May 17 00:41:37.152250 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:41:37.152340 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif36255af94c: link becomes ready May 17 00:41:37.153274 systemd-networkd[1442]: calif36255af94c: Gained carrier May 17 00:41:37.153902 (udev-worker)[3016]: Network interface NamePolicy= disabled on kernel command line. May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.052 [INFO][2996] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.18-k8s-csi--node--driver--h2g6f-eth0 csi-node-driver- calico-system c0886405-922a-42c7-b394-b5abf5ec9865 1228 0 2025-05-17 00:41:10 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.31.18 csi-node-driver-h2g6f eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calif36255af94c [] [] }} ContainerID="822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" Namespace="calico-system" Pod="csi-node-driver-h2g6f" WorkloadEndpoint="172.31.31.18-k8s-csi--node--driver--h2g6f-" May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.052 [INFO][2996] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" Namespace="calico-system" Pod="csi-node-driver-h2g6f" WorkloadEndpoint="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.080 [INFO][3009] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" HandleID="k8s-pod-network.822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" Workload="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.080 [INFO][3009] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" HandleID="k8s-pod-network.822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" Workload="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9020), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.31.18", "pod":"csi-node-driver-h2g6f", "timestamp":"2025-05-17 00:41:37.080711532 +0000 UTC"}, Hostname:"172.31.31.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.081 [INFO][3009] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.081 [INFO][3009] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.081 [INFO][3009] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.18' May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.090 [INFO][3009] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" host="172.31.31.18" May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.104 [INFO][3009] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.18" May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.110 [INFO][3009] ipam/ipam.go 511: Trying affinity for 192.168.19.192/26 host="172.31.31.18" May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.113 [INFO][3009] ipam/ipam.go 158: Attempting to load block cidr=192.168.19.192/26 host="172.31.31.18" May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.115 [INFO][3009] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.19.192/26 host="172.31.31.18" May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.115 [INFO][3009] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.19.192/26 handle="k8s-pod-network.822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" host="172.31.31.18" May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.117 [INFO][3009] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756 May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.130 [INFO][3009] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.19.192/26 handle="k8s-pod-network.822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" host="172.31.31.18" May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.141 [INFO][3009] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.19.193/26] block=192.168.19.192/26 handle="k8s-pod-network.822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" host="172.31.31.18" May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.141 [INFO][3009] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.19.193/26] handle="k8s-pod-network.822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" host="172.31.31.18" May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.141 [INFO][3009] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:37.166531 env[1725]: 2025-05-17 00:41:37.141 [INFO][3009] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.19.193/26] IPv6=[] ContainerID="822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" HandleID="k8s-pod-network.822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" Workload="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:41:37.167254 env[1725]: 2025-05-17 00:41:37.143 [INFO][2996] cni-plugin/k8s.go 418: Populated endpoint ContainerID="822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" Namespace="calico-system" Pod="csi-node-driver-h2g6f" WorkloadEndpoint="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.18-k8s-csi--node--driver--h2g6f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c0886405-922a-42c7-b394-b5abf5ec9865", ResourceVersion:"1228", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.18", ContainerID:"", Pod:"csi-node-driver-h2g6f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.19.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif36255af94c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:37.167254 env[1725]: 2025-05-17 00:41:37.143 [INFO][2996] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.19.193/32] ContainerID="822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" Namespace="calico-system" Pod="csi-node-driver-h2g6f" WorkloadEndpoint="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:41:37.167254 env[1725]: 2025-05-17 00:41:37.143 [INFO][2996] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif36255af94c ContainerID="822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" Namespace="calico-system" Pod="csi-node-driver-h2g6f" WorkloadEndpoint="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:41:37.167254 env[1725]: 2025-05-17 00:41:37.152 [INFO][2996] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" Namespace="calico-system" Pod="csi-node-driver-h2g6f" WorkloadEndpoint="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:41:37.167254 env[1725]: 2025-05-17 00:41:37.153 [INFO][2996] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" Namespace="calico-system" Pod="csi-node-driver-h2g6f" WorkloadEndpoint="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.18-k8s-csi--node--driver--h2g6f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c0886405-922a-42c7-b394-b5abf5ec9865", ResourceVersion:"1228", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.18", ContainerID:"822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756", Pod:"csi-node-driver-h2g6f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.19.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif36255af94c", MAC:"fe:66:1e:22:09:cb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:37.167254 env[1725]: 2025-05-17 00:41:37.164 [INFO][2996] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756" Namespace="calico-system" Pod="csi-node-driver-h2g6f" WorkloadEndpoint="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:41:37.188057 env[1725]: time="2025-05-17T00:41:37.187987739Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:37.188268 env[1725]: time="2025-05-17T00:41:37.188033292Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:37.188268 env[1725]: time="2025-05-17T00:41:37.188049999Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:37.188417 env[1725]: time="2025-05-17T00:41:37.188362011Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756 pid=3035 runtime=io.containerd.runc.v2 May 17 00:41:37.224396 kernel: audit: type=1325 audit(1747442497.184:690): table=filter:77 family=2 entries=38 op=nft_register_chain pid=3026 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:37.224544 kernel: audit: type=1300 audit(1747442497.184:690): arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7fff4176dc70 a2=0 a3=7fff4176dc5c items=0 ppid=2750 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.184000 audit[3026]: NETFILTER_CFG table=filter:77 family=2 entries=38 op=nft_register_chain pid=3026 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:37.184000 audit[3026]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7fff4176dc70 a2=0 a3=7fff4176dc5c items=0 ppid=2750 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.218529 systemd[1]: Started cri-containerd-822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756.scope. May 17 00:41:37.184000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:37.231457 kernel: audit: type=1327 audit(1747442497.184:690): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:37.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.249757 kernel: audit: type=1400 audit(1747442497.241:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.251511 kernel: audit: type=1400 audit(1747442497.241:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.241000 audit: BPF prog-id=106 op=LOAD May 17 00:41:37.245000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3035 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.257812 kernel: audit: type=1400 audit(1747442497.241:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326365373765616238383361313537383731393037353966653031 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3035 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326365373765616238383361313537383731393037353966653031 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit: BPF prog-id=107 op=LOAD May 17 00:41:37.245000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030eae0 items=0 ppid=3035 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326365373765616238383361313537383731393037353966653031 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.245000 audit: BPF prog-id=108 op=LOAD May 17 00:41:37.245000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030eb28 items=0 ppid=3035 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326365373765616238383361313537383731393037353966653031 May 17 00:41:37.245000 audit: BPF prog-id=108 op=UNLOAD May 17 00:41:37.246000 audit: BPF prog-id=107 op=UNLOAD May 17 00:41:37.246000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.246000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.246000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.246000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.246000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.246000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.246000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.246000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.246000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.246000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.246000 audit: BPF prog-id=109 op=LOAD May 17 00:41:37.246000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030ef38 items=0 ppid=3035 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326365373765616238383361313537383731393037353966653031 May 17 00:41:37.270728 env[1725]: time="2025-05-17T00:41:37.270680526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h2g6f,Uid:c0886405-922a-42c7-b394-b5abf5ec9865,Namespace:calico-system,Attempt:1,} returns sandbox id \"822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756\"" May 17 00:41:37.282824 env[1725]: time="2025-05-17T00:41:37.282757130Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:41:37.493223 kubelet[2103]: E0517 00:41:37.493158 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:37.985929 systemd[1]: run-containerd-runc-k8s.io-822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756-runc.4mTd1z.mount: Deactivated successfully. May 17 00:41:38.494180 kubelet[2103]: E0517 00:41:38.494090 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:38.523648 systemd-networkd[1442]: calif36255af94c: Gained IPv6LL May 17 00:41:38.630037 env[1725]: time="2025-05-17T00:41:38.629996612Z" level=info msg="StopPodSandbox for \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\"" May 17 00:41:38.741136 env[1725]: time="2025-05-17T00:41:38.741099216Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:38.744884 env[1725]: time="2025-05-17T00:41:38.744495536Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:38.746593 env[1725]: 2025-05-17 00:41:38.702 [INFO][3083] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:41:38.746593 env[1725]: 2025-05-17 00:41:38.702 [INFO][3083] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" iface="eth0" netns="/var/run/netns/cni-e5e8acf2-ea73-86bd-7d05-624b8ae5ddd3" May 17 00:41:38.746593 env[1725]: 2025-05-17 00:41:38.702 [INFO][3083] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" iface="eth0" netns="/var/run/netns/cni-e5e8acf2-ea73-86bd-7d05-624b8ae5ddd3" May 17 00:41:38.746593 env[1725]: 2025-05-17 00:41:38.703 [INFO][3083] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" iface="eth0" netns="/var/run/netns/cni-e5e8acf2-ea73-86bd-7d05-624b8ae5ddd3" May 17 00:41:38.746593 env[1725]: 2025-05-17 00:41:38.703 [INFO][3083] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:41:38.746593 env[1725]: 2025-05-17 00:41:38.703 [INFO][3083] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:41:38.746593 env[1725]: 2025-05-17 00:41:38.734 [INFO][3090] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" HandleID="k8s-pod-network.76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" Workload="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:41:38.746593 env[1725]: 2025-05-17 00:41:38.734 [INFO][3090] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:38.746593 env[1725]: 2025-05-17 00:41:38.734 [INFO][3090] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:38.746593 env[1725]: 2025-05-17 00:41:38.741 [WARNING][3090] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" HandleID="k8s-pod-network.76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" Workload="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:41:38.746593 env[1725]: 2025-05-17 00:41:38.741 [INFO][3090] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" HandleID="k8s-pod-network.76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" Workload="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:41:38.746593 env[1725]: 2025-05-17 00:41:38.743 [INFO][3090] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:38.746593 env[1725]: 2025-05-17 00:41:38.745 [INFO][3083] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:41:38.748368 systemd[1]: run-netns-cni\x2de5e8acf2\x2dea73\x2d86bd\x2d7d05\x2d624b8ae5ddd3.mount: Deactivated successfully. May 17 00:41:38.749505 env[1725]: time="2025-05-17T00:41:38.748991501Z" level=info msg="TearDown network for sandbox \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\" successfully" May 17 00:41:38.749505 env[1725]: time="2025-05-17T00:41:38.749023270Z" level=info msg="StopPodSandbox for \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\" returns successfully" May 17 00:41:38.749882 env[1725]: time="2025-05-17T00:41:38.749853535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zh7tm,Uid:8b92dfa6-8a61-41b6-965a-26f80820187b,Namespace:default,Attempt:1,}" May 17 00:41:38.750116 env[1725]: time="2025-05-17T00:41:38.750097752Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:38.752549 env[1725]: time="2025-05-17T00:41:38.752522154Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:38.752910 env[1725]: time="2025-05-17T00:41:38.752879680Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:41:38.755328 env[1725]: time="2025-05-17T00:41:38.755298923Z" level=info msg="CreateContainer within sandbox \"822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:41:38.794815 env[1725]: time="2025-05-17T00:41:38.794772781Z" level=info msg="CreateContainer within sandbox \"822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"cd15c5638e53e2ae7be0e405612712695b7fe560ddfe4b2e75ed59eef3d50ba8\"" May 17 00:41:38.795660 env[1725]: time="2025-05-17T00:41:38.795639388Z" level=info msg="StartContainer for \"cd15c5638e53e2ae7be0e405612712695b7fe560ddfe4b2e75ed59eef3d50ba8\"" May 17 00:41:38.819170 systemd[1]: Started cri-containerd-cd15c5638e53e2ae7be0e405612712695b7fe560ddfe4b2e75ed59eef3d50ba8.scope. May 17 00:41:38.839000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.841884 kernel: kauditd_printk_skb: 54 callbacks suppressed May 17 00:41:38.841956 kernel: audit: type=1400 audit(1747442498.839:709): avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.839000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fada1acd718 items=0 ppid=3035 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.850108 kernel: audit: type=1300 audit(1747442498.839:709): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fada1acd718 items=0 ppid=3035 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.850194 kernel: audit: type=1327 audit(1747442498.839:709): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364313563353633386535336532616537626530653430353631323731 May 17 00:41:38.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364313563353633386535336532616537626530653430353631323731 May 17 00:41:38.854769 kernel: audit: type=1400 audit(1747442498.839:710): avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.839000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.861098 kernel: audit: type=1400 audit(1747442498.839:710): avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.839000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.864472 kernel: audit: type=1400 audit(1747442498.839:710): avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.839000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.867795 kernel: audit: type=1400 audit(1747442498.839:710): avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.839000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.871090 kernel: audit: type=1400 audit(1747442498.839:710): avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.839000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.839000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.875803 kernel: audit: type=1400 audit(1747442498.839:710): avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.875859 kernel: audit: type=1400 audit(1747442498.839:710): avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.839000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.839000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.839000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.839000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.839000 audit: BPF prog-id=110 op=LOAD May 17 00:41:38.839000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000210898 items=0 ppid=3035 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364313563353633386535336532616537626530653430353631323731 May 17 00:41:38.844000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.844000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.844000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.844000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.844000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.844000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.844000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.844000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.844000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.844000 audit: BPF prog-id=111 op=LOAD May 17 00:41:38.844000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002108e8 items=0 ppid=3035 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364313563353633386535336532616537626530653430353631323731 May 17 00:41:38.863000 audit: BPF prog-id=111 op=UNLOAD May 17 00:41:38.863000 audit: BPF prog-id=110 op=UNLOAD May 17 00:41:38.863000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.863000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.863000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.863000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.863000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.863000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.863000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.863000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.863000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.863000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:38.863000 audit: BPF prog-id=112 op=LOAD May 17 00:41:38.863000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000210978 items=0 ppid=3035 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:38.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364313563353633386535336532616537626530653430353631323731 May 17 00:41:38.919510 env[1725]: time="2025-05-17T00:41:38.919466033Z" level=info msg="StartContainer for \"cd15c5638e53e2ae7be0e405612712695b7fe560ddfe4b2e75ed59eef3d50ba8\" returns successfully" May 17 00:41:38.921081 env[1725]: time="2025-05-17T00:41:38.921059166Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:41:38.956469 systemd-networkd[1442]: cali401fb7f01d3: Link UP May 17 00:41:38.966504 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:41:38.966680 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali401fb7f01d3: link becomes ready May 17 00:41:38.961529 systemd-networkd[1442]: cali401fb7f01d3: Gained carrier May 17 00:41:38.986690 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1235279421.mount: Deactivated successfully. May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.822 [INFO][3098] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0 nginx-deployment-7fcdb87857- default 8b92dfa6-8a61-41b6-965a-26f80820187b 1243 0 2025-05-17 00:41:26 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.31.18 nginx-deployment-7fcdb87857-zh7tm eth0 default [] [] [kns.default ksa.default.default] cali401fb7f01d3 [] [] }} ContainerID="1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-zh7tm" WorkloadEndpoint="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-" May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.822 [INFO][3098] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-zh7tm" WorkloadEndpoint="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.873 [INFO][3138] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" HandleID="k8s-pod-network.1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" Workload="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.874 [INFO][3138] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" HandleID="k8s-pod-network.1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" Workload="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1890), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.18", "pod":"nginx-deployment-7fcdb87857-zh7tm", "timestamp":"2025-05-17 00:41:38.873259407 +0000 UTC"}, Hostname:"172.31.31.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.874 [INFO][3138] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.874 [INFO][3138] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.874 [INFO][3138] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.18' May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.893 [INFO][3138] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" host="172.31.31.18" May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.903 [INFO][3138] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.18" May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.924 [INFO][3138] ipam/ipam.go 511: Trying affinity for 192.168.19.192/26 host="172.31.31.18" May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.926 [INFO][3138] ipam/ipam.go 158: Attempting to load block cidr=192.168.19.192/26 host="172.31.31.18" May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.930 [INFO][3138] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.19.192/26 host="172.31.31.18" May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.930 [INFO][3138] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.19.192/26 handle="k8s-pod-network.1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" host="172.31.31.18" May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.933 [INFO][3138] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.940 [INFO][3138] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.19.192/26 handle="k8s-pod-network.1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" host="172.31.31.18" May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.950 [INFO][3138] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.19.194/26] block=192.168.19.192/26 handle="k8s-pod-network.1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" host="172.31.31.18" May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.950 [INFO][3138] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.19.194/26] handle="k8s-pod-network.1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" host="172.31.31.18" May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.951 [INFO][3138] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:38.993691 env[1725]: 2025-05-17 00:41:38.951 [INFO][3138] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.19.194/26] IPv6=[] ContainerID="1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" HandleID="k8s-pod-network.1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" Workload="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:41:38.994347 env[1725]: 2025-05-17 00:41:38.952 [INFO][3098] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-zh7tm" WorkloadEndpoint="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"8b92dfa6-8a61-41b6-965a-26f80820187b", ResourceVersion:"1243", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.18", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-zh7tm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali401fb7f01d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:38.994347 env[1725]: 2025-05-17 00:41:38.952 [INFO][3098] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.19.194/32] ContainerID="1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-zh7tm" WorkloadEndpoint="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:41:38.994347 env[1725]: 2025-05-17 00:41:38.952 [INFO][3098] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali401fb7f01d3 ContainerID="1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-zh7tm" WorkloadEndpoint="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:41:38.994347 env[1725]: 2025-05-17 00:41:38.967 [INFO][3098] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-zh7tm" WorkloadEndpoint="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:41:38.994347 env[1725]: 2025-05-17 00:41:38.967 [INFO][3098] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-zh7tm" WorkloadEndpoint="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"8b92dfa6-8a61-41b6-965a-26f80820187b", ResourceVersion:"1243", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.18", ContainerID:"1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc", Pod:"nginx-deployment-7fcdb87857-zh7tm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali401fb7f01d3", MAC:"c2:9e:aa:15:89:03", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:38.994347 env[1725]: 2025-05-17 00:41:38.983 [INFO][3098] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc" Namespace="default" Pod="nginx-deployment-7fcdb87857-zh7tm" WorkloadEndpoint="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:41:39.005000 audit[3161]: NETFILTER_CFG table=filter:78 family=2 entries=42 op=nft_register_chain pid=3161 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:39.005000 audit[3161]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7fff2e7106c0 a2=0 a3=7fff2e7106ac items=0 ppid=2750 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:39.005000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:39.015709 env[1725]: time="2025-05-17T00:41:39.015521321Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:39.015709 env[1725]: time="2025-05-17T00:41:39.015563308Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:39.015709 env[1725]: time="2025-05-17T00:41:39.015573923Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:39.016082 env[1725]: time="2025-05-17T00:41:39.016036518Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc pid=3170 runtime=io.containerd.runc.v2 May 17 00:41:39.049090 systemd[1]: run-containerd-runc-k8s.io-1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc-runc.PfiQGB.mount: Deactivated successfully. May 17 00:41:39.058186 systemd[1]: Started cri-containerd-1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc.scope. May 17 00:41:39.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.069000 audit: BPF prog-id=113 op=LOAD May 17 00:41:39.070000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.070000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3170 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:39.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353938343162663231653338376536633334383039316263613762 May 17 00:41:39.070000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.070000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3170 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:39.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353938343162663231653338376536633334383039316263613762 May 17 00:41:39.070000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.070000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.070000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.070000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.070000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.070000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.070000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.070000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.070000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.070000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.070000 audit: BPF prog-id=114 op=LOAD May 17 00:41:39.070000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00011af30 items=0 ppid=3170 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:39.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353938343162663231653338376536633334383039316263613762 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit: BPF prog-id=115 op=LOAD May 17 00:41:39.071000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00011af78 items=0 ppid=3170 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:39.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353938343162663231653338376536633334383039316263613762 May 17 00:41:39.071000 audit: BPF prog-id=115 op=UNLOAD May 17 00:41:39.071000 audit: BPF prog-id=114 op=UNLOAD May 17 00:41:39.071000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:39.071000 audit: BPF prog-id=116 op=LOAD May 17 00:41:39.071000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00011b388 items=0 ppid=3170 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:39.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353938343162663231653338376536633334383039316263613762 May 17 00:41:39.103787 env[1725]: time="2025-05-17T00:41:39.103735961Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zh7tm,Uid:8b92dfa6-8a61-41b6-965a-26f80820187b,Namespace:default,Attempt:1,} returns sandbox id \"1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc\"" May 17 00:41:39.495098 kubelet[2103]: E0517 00:41:39.494975 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:40.413278 env[1725]: time="2025-05-17T00:41:40.413221812Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:40.415168 env[1725]: time="2025-05-17T00:41:40.415131265Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:40.418767 env[1725]: time="2025-05-17T00:41:40.418737601Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:40.421366 env[1725]: time="2025-05-17T00:41:40.421336814Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:40.422037 env[1725]: time="2025-05-17T00:41:40.422011299Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:41:40.424276 env[1725]: time="2025-05-17T00:41:40.424247964Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:41:40.425051 env[1725]: time="2025-05-17T00:41:40.425024216Z" level=info msg="CreateContainer within sandbox \"822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:41:40.450301 env[1725]: time="2025-05-17T00:41:40.450252326Z" level=info msg="CreateContainer within sandbox \"822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"89439842acb0fdaad44fb731d1b01f889f5c94552b2dd85a070c791f8220c827\"" May 17 00:41:40.451027 env[1725]: time="2025-05-17T00:41:40.451001618Z" level=info msg="StartContainer for \"89439842acb0fdaad44fb731d1b01f889f5c94552b2dd85a070c791f8220c827\"" May 17 00:41:40.476617 systemd[1]: Started cri-containerd-89439842acb0fdaad44fb731d1b01f889f5c94552b2dd85a070c791f8220c827.scope. May 17 00:41:40.495090 kubelet[2103]: E0517 00:41:40.495039 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:40.495000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.495000 audit[3218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f37e4ed5828 items=0 ppid=3035 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:40.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839343339383432616362306664616164343466623733316431623031 May 17 00:41:40.495000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.495000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.495000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.495000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.495000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.495000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.495000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.495000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.495000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.495000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.495000 audit: BPF prog-id=117 op=LOAD May 17 00:41:40.495000 audit[3218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000381f68 items=0 ppid=3035 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:40.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839343339383432616362306664616164343466623733316431623031 May 17 00:41:40.496000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.496000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.496000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.496000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.496000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.496000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.496000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.496000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.496000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.496000 audit: BPF prog-id=118 op=LOAD May 17 00:41:40.496000 audit[3218]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000381fb8 items=0 ppid=3035 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:40.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839343339383432616362306664616164343466623733316431623031 May 17 00:41:40.497000 audit: BPF prog-id=118 op=UNLOAD May 17 00:41:40.497000 audit: BPF prog-id=117 op=UNLOAD May 17 00:41:40.497000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.497000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.497000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.497000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.497000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.497000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.497000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.497000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.497000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.497000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:40.497000 audit: BPF prog-id=119 op=LOAD May 17 00:41:40.497000 audit[3218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003ea048 items=0 ppid=3035 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:40.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839343339383432616362306664616164343466623733316431623031 May 17 00:41:40.507716 systemd-networkd[1442]: cali401fb7f01d3: Gained IPv6LL May 17 00:41:40.519647 env[1725]: time="2025-05-17T00:41:40.519598172Z" level=info msg="StartContainer for \"89439842acb0fdaad44fb731d1b01f889f5c94552b2dd85a070c791f8220c827\" returns successfully" May 17 00:41:40.567608 kubelet[2103]: I0517 00:41:40.567575 2103 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:41:40.567952 kubelet[2103]: I0517 00:41:40.567637 2103 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:41:41.495925 kubelet[2103]: E0517 00:41:41.495865 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:42.496636 kubelet[2103]: E0517 00:41:42.496589 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:43.214344 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2302111852.mount: Deactivated successfully. May 17 00:41:43.497193 kubelet[2103]: E0517 00:41:43.497042 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:44.497456 kubelet[2103]: E0517 00:41:44.497367 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:44.776502 env[1725]: time="2025-05-17T00:41:44.776343024Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:44.779381 env[1725]: time="2025-05-17T00:41:44.779342318Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:44.781225 env[1725]: time="2025-05-17T00:41:44.781196620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:44.783170 env[1725]: time="2025-05-17T00:41:44.783146270Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:44.783682 env[1725]: time="2025-05-17T00:41:44.783653764Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:41:44.787454 env[1725]: time="2025-05-17T00:41:44.787403655Z" level=info msg="CreateContainer within sandbox \"1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 17 00:41:44.800966 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2000385971.mount: Deactivated successfully. May 17 00:41:44.807002 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3284949504.mount: Deactivated successfully. May 17 00:41:44.810601 env[1725]: time="2025-05-17T00:41:44.810557115Z" level=info msg="CreateContainer within sandbox \"1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"58b74d595449a6e96180a139f9bd5256f34e5a3621f67cf4af7e740d31dfb324\"" May 17 00:41:44.811333 env[1725]: time="2025-05-17T00:41:44.811235680Z" level=info msg="StartContainer for \"58b74d595449a6e96180a139f9bd5256f34e5a3621f67cf4af7e740d31dfb324\"" May 17 00:41:44.832914 systemd[1]: Started cri-containerd-58b74d595449a6e96180a139f9bd5256f34e5a3621f67cf4af7e740d31dfb324.scope. May 17 00:41:44.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.851806 kernel: kauditd_printk_skb: 136 callbacks suppressed May 17 00:41:44.851881 kernel: audit: type=1400 audit(1747442504.849:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.861319 kernel: audit: type=1400 audit(1747442504.849:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.861491 kernel: audit: type=1400 audit(1747442504.849:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.867679 kernel: audit: type=1400 audit(1747442504.849:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.874631 kernel: audit: type=1400 audit(1747442504.849:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.874736 kernel: audit: type=1400 audit(1747442504.849:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.883117 kernel: audit: type=1400 audit(1747442504.849:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.883237 kernel: audit: type=1400 audit(1747442504.849:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.888509 kernel: audit: type=1400 audit(1747442504.849:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.888629 kernel: audit: type=1400 audit(1747442504.849:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.892627 env[1725]: time="2025-05-17T00:41:44.892582121Z" level=info msg="StartContainer for \"58b74d595449a6e96180a139f9bd5256f34e5a3621f67cf4af7e740d31dfb324\" returns successfully" May 17 00:41:44.849000 audit: BPF prog-id=120 op=LOAD May 17 00:41:44.850000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.850000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3170 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:44.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623734643539353434396136653936313830613133396639626435 May 17 00:41:44.850000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.850000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3170 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:44.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623734643539353434396136653936313830613133396639626435 May 17 00:41:44.850000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.850000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.850000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.850000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.850000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.850000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.850000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.850000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.850000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.850000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.850000 audit: BPF prog-id=121 op=LOAD May 17 00:41:44.850000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000232ad0 items=0 ppid=3170 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:44.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623734643539353434396136653936313830613133396639626435 May 17 00:41:44.853000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.853000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.853000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.853000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.853000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.853000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.853000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.853000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.853000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.853000 audit: BPF prog-id=122 op=LOAD May 17 00:41:44.853000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000232b18 items=0 ppid=3170 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:44.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623734643539353434396136653936313830613133396639626435 May 17 00:41:44.857000 audit: BPF prog-id=122 op=UNLOAD May 17 00:41:44.857000 audit: BPF prog-id=121 op=UNLOAD May 17 00:41:44.857000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.857000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.857000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.857000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.857000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.857000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.857000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.857000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.857000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.857000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:44.857000 audit: BPF prog-id=123 op=LOAD May 17 00:41:44.857000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000232f28 items=0 ppid=3170 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:44.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623734643539353434396136653936313830613133396639626435 May 17 00:41:45.498505 kubelet[2103]: E0517 00:41:45.498462 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:45.792963 kubelet[2103]: I0517 00:41:45.792865 2103 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-h2g6f" podStartSLOduration=32.642463165 podStartE2EDuration="35.792844655s" podCreationTimestamp="2025-05-17 00:41:10 +0000 UTC" firstStartedPulling="2025-05-17 00:41:37.27301204 +0000 UTC m=+27.343687749" lastFinishedPulling="2025-05-17 00:41:40.423393532 +0000 UTC m=+30.494069239" observedRunningTime="2025-05-17 00:41:40.753939013 +0000 UTC m=+30.824614736" watchObservedRunningTime="2025-05-17 00:41:45.792844655 +0000 UTC m=+35.863520379" May 17 00:41:46.498700 kubelet[2103]: E0517 00:41:46.498658 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:47.499880 kubelet[2103]: E0517 00:41:47.499823 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:48.138092 update_engine[1710]: I0517 00:41:48.138013 1710 update_attempter.cc:509] Updating boot flags... May 17 00:41:48.500736 kubelet[2103]: E0517 00:41:48.500590 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:48.778285 amazon-ssm-agent[1698]: 2025-05-17 00:41:48 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated May 17 00:41:49.501865 kubelet[2103]: E0517 00:41:49.501721 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:50.462845 kubelet[2103]: E0517 00:41:50.462795 2103 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:50.502626 kubelet[2103]: E0517 00:41:50.502587 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:51.503312 kubelet[2103]: E0517 00:41:51.503271 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:52.040000 audit[3499]: NETFILTER_CFG table=filter:79 family=2 entries=12 op=nft_register_rule pid=3499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:52.044010 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:41:52.044134 kernel: audit: type=1325 audit(1747442512.040:758): table=filter:79 family=2 entries=12 op=nft_register_rule pid=3499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:52.040000 audit[3499]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff3f04f8c0 a2=0 a3=7fff3f04f8ac items=0 ppid=2337 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:52.055800 kernel: audit: type=1300 audit(1747442512.040:758): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff3f04f8c0 a2=0 a3=7fff3f04f8ac items=0 ppid=2337 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:52.055938 kernel: audit: type=1327 audit(1747442512.040:758): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:52.040000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:52.063000 audit[3499]: NETFILTER_CFG table=nat:80 family=2 entries=34 op=nft_register_chain pid=3499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:52.063000 audit[3499]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff3f04f8c0 a2=0 a3=7fff3f04f8ac items=0 ppid=2337 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:52.076344 kernel: audit: type=1325 audit(1747442512.063:759): table=nat:80 family=2 entries=34 op=nft_register_chain pid=3499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:52.076534 kernel: audit: type=1300 audit(1747442512.063:759): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff3f04f8c0 a2=0 a3=7fff3f04f8ac items=0 ppid=2337 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:52.076576 kernel: audit: type=1327 audit(1747442512.063:759): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:52.063000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:52.504458 kubelet[2103]: E0517 00:41:52.504302 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:53.505361 kubelet[2103]: E0517 00:41:53.505319 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:54.505995 kubelet[2103]: E0517 00:41:54.505953 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:55.506156 kubelet[2103]: E0517 00:41:55.506087 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:55.892000 audit[3501]: NETFILTER_CFG table=filter:81 family=2 entries=24 op=nft_register_rule pid=3501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:55.892000 audit[3501]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffed1985010 a2=0 a3=7ffed1984ffc items=0 ppid=2337 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.904794 kernel: audit: type=1325 audit(1747442515.892:760): table=filter:81 family=2 entries=24 op=nft_register_rule pid=3501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:55.904934 kernel: audit: type=1300 audit(1747442515.892:760): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffed1985010 a2=0 a3=7ffed1984ffc items=0 ppid=2337 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.904964 kernel: audit: type=1327 audit(1747442515.892:760): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:55.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:55.898000 audit[3501]: NETFILTER_CFG table=nat:82 family=2 entries=22 op=nft_register_rule pid=3501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:55.912347 kernel: audit: type=1325 audit(1747442515.898:761): table=nat:82 family=2 entries=22 op=nft_register_rule pid=3501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:55.898000 audit[3501]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffed1985010 a2=0 a3=0 items=0 ppid=2337 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.898000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:55.922000 audit[3503]: NETFILTER_CFG table=filter:83 family=2 entries=36 op=nft_register_rule pid=3503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:55.922000 audit[3503]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffc81eed090 a2=0 a3=7ffc81eed07c items=0 ppid=2337 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.922000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:55.926000 audit[3503]: NETFILTER_CFG table=nat:84 family=2 entries=22 op=nft_register_rule pid=3503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:55.926000 audit[3503]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc81eed090 a2=0 a3=0 items=0 ppid=2337 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:55.926000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:56.199346 kubelet[2103]: I0517 00:41:56.199215 2103 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-zh7tm" podStartSLOduration=24.518109683 podStartE2EDuration="30.199200082s" podCreationTimestamp="2025-05-17 00:41:26 +0000 UTC" firstStartedPulling="2025-05-17 00:41:39.104527045 +0000 UTC m=+29.175202763" lastFinishedPulling="2025-05-17 00:41:44.785617454 +0000 UTC m=+34.856293162" observedRunningTime="2025-05-17 00:41:45.793489608 +0000 UTC m=+35.864165335" watchObservedRunningTime="2025-05-17 00:41:56.199200082 +0000 UTC m=+46.269875808" May 17 00:41:56.204272 systemd[1]: Created slice kubepods-besteffort-podaef11982_5ab6_4532_b8bc_86f66a84f9c4.slice. May 17 00:41:56.295092 kubelet[2103]: I0517 00:41:56.295052 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j7z7n\" (UniqueName: \"kubernetes.io/projected/aef11982-5ab6-4532-b8bc-86f66a84f9c4-kube-api-access-j7z7n\") pod \"nfs-server-provisioner-0\" (UID: \"aef11982-5ab6-4532-b8bc-86f66a84f9c4\") " pod="default/nfs-server-provisioner-0" May 17 00:41:56.295092 kubelet[2103]: I0517 00:41:56.295096 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/aef11982-5ab6-4532-b8bc-86f66a84f9c4-data\") pod \"nfs-server-provisioner-0\" (UID: \"aef11982-5ab6-4532-b8bc-86f66a84f9c4\") " pod="default/nfs-server-provisioner-0" May 17 00:41:56.507229 kubelet[2103]: E0517 00:41:56.507111 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:56.508793 env[1725]: time="2025-05-17T00:41:56.508754732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:aef11982-5ab6-4532-b8bc-86f66a84f9c4,Namespace:default,Attempt:0,}" May 17 00:41:56.664725 systemd-networkd[1442]: cali60e51b789ff: Link UP May 17 00:41:56.669231 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:41:56.669338 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 17 00:41:56.669502 systemd-networkd[1442]: cali60e51b789ff: Gained carrier May 17 00:41:56.669728 (udev-worker)[3524]: Network interface NamePolicy= disabled on kernel command line. May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.562 [INFO][3505] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.18-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default aef11982-5ab6-4532-b8bc-86f66a84f9c4 1350 0 2025-05-17 00:41:56 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.31.18 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.18-k8s-nfs--server--provisioner--0-" May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.563 [INFO][3505] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.595 [INFO][3517] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" HandleID="k8s-pod-network.3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" Workload="172.31.31.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.596 [INFO][3517] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" HandleID="k8s-pod-network.3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" Workload="172.31.31.18-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c7060), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.18", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-17 00:41:56.595884313 +0000 UTC"}, Hostname:"172.31.31.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.596 [INFO][3517] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.596 [INFO][3517] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.596 [INFO][3517] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.18' May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.605 [INFO][3517] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" host="172.31.31.18" May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.618 [INFO][3517] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.18" May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.624 [INFO][3517] ipam/ipam.go 511: Trying affinity for 192.168.19.192/26 host="172.31.31.18" May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.626 [INFO][3517] ipam/ipam.go 158: Attempting to load block cidr=192.168.19.192/26 host="172.31.31.18" May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.628 [INFO][3517] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.19.192/26 host="172.31.31.18" May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.628 [INFO][3517] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.19.192/26 handle="k8s-pod-network.3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" host="172.31.31.18" May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.632 [INFO][3517] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9 May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.640 [INFO][3517] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.19.192/26 handle="k8s-pod-network.3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" host="172.31.31.18" May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.659 [INFO][3517] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.19.195/26] block=192.168.19.192/26 handle="k8s-pod-network.3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" host="172.31.31.18" May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.659 [INFO][3517] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.19.195/26] handle="k8s-pod-network.3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" host="172.31.31.18" May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.659 [INFO][3517] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:56.694261 env[1725]: 2025-05-17 00:41:56.659 [INFO][3517] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.19.195/26] IPv6=[] ContainerID="3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" HandleID="k8s-pod-network.3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" Workload="172.31.31.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:56.694998 env[1725]: 2025-05-17 00:41:56.660 [INFO][3505] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.18-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.18-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"aef11982-5ab6-4532-b8bc-86f66a84f9c4", ResourceVersion:"1350", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.18", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.19.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:56.694998 env[1725]: 2025-05-17 00:41:56.660 [INFO][3505] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.19.195/32] ContainerID="3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:56.694998 env[1725]: 2025-05-17 00:41:56.660 [INFO][3505] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:56.694998 env[1725]: 2025-05-17 00:41:56.670 [INFO][3505] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:56.695171 env[1725]: 2025-05-17 00:41:56.670 [INFO][3505] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.18-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.18-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"aef11982-5ab6-4532-b8bc-86f66a84f9c4", ResourceVersion:"1350", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.18", ContainerID:"3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.19.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"9e:07:22:d6:af:19", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:56.695171 env[1725]: 2025-05-17 00:41:56.692 [INFO][3505] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.31.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:56.705136 env[1725]: time="2025-05-17T00:41:56.704905906Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:56.705136 env[1725]: time="2025-05-17T00:41:56.704940546Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:56.705136 env[1725]: time="2025-05-17T00:41:56.704958264Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:56.705347 env[1725]: time="2025-05-17T00:41:56.705239015Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9 pid=3539 runtime=io.containerd.runc.v2 May 17 00:41:56.721184 systemd[1]: Started cri-containerd-3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9.scope. May 17 00:41:56.745000 audit[3562]: NETFILTER_CFG table=filter:85 family=2 entries=40 op=nft_register_chain pid=3562 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:56.745000 audit[3562]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7fff2b2d3090 a2=0 a3=7fff2b2d307c items=0 ppid=2750 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.745000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:56.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit: BPF prog-id=124 op=LOAD May 17 00:41:56.749000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[3549]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3539 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363616661636666356464303639393139623161303566323932343239 May 17 00:41:56.749000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[3549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3539 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363616661636666356464303639393139623161303566323932343239 May 17 00:41:56.749000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.749000 audit: BPF prog-id=125 op=LOAD May 17 00:41:56.749000 audit[3549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002c9ce0 items=0 ppid=3539 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363616661636666356464303639393139623161303566323932343239 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit: BPF prog-id=126 op=LOAD May 17 00:41:56.750000 audit[3549]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002c9d28 items=0 ppid=3539 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363616661636666356464303639393139623161303566323932343239 May 17 00:41:56.750000 audit: BPF prog-id=126 op=UNLOAD May 17 00:41:56.750000 audit: BPF prog-id=125 op=UNLOAD May 17 00:41:56.750000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { perfmon } for pid=3549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit[3549]: AVC avc: denied { bpf } for pid=3549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:56.750000 audit: BPF prog-id=127 op=LOAD May 17 00:41:56.750000 audit[3549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00034e138 items=0 ppid=3539 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:56.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363616661636666356464303639393139623161303566323932343239 May 17 00:41:56.798056 env[1725]: time="2025-05-17T00:41:56.798010445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:aef11982-5ab6-4532-b8bc-86f66a84f9c4,Namespace:default,Attempt:0,} returns sandbox id \"3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9\"" May 17 00:41:56.800541 env[1725]: time="2025-05-17T00:41:56.800500609Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 17 00:41:57.508184 kubelet[2103]: E0517 00:41:57.508108 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:58.427633 systemd-networkd[1442]: cali60e51b789ff: Gained IPv6LL May 17 00:41:58.508327 kubelet[2103]: E0517 00:41:58.508245 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:59.424035 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount906431510.mount: Deactivated successfully. May 17 00:41:59.509011 kubelet[2103]: E0517 00:41:59.508917 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:00.509735 kubelet[2103]: E0517 00:42:00.509690 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:01.509951 kubelet[2103]: E0517 00:42:01.509901 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:02.210059 env[1725]: time="2025-05-17T00:42:02.210004872Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:02.232869 env[1725]: time="2025-05-17T00:42:02.232670899Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:02.264746 env[1725]: time="2025-05-17T00:42:02.264698890Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:02.282115 env[1725]: time="2025-05-17T00:42:02.282066403Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:02.283410 env[1725]: time="2025-05-17T00:42:02.283351323Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 17 00:42:02.298244 env[1725]: time="2025-05-17T00:42:02.298200714Z" level=info msg="CreateContainer within sandbox \"3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 17 00:42:02.333303 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount710532443.mount: Deactivated successfully. May 17 00:42:02.364323 env[1725]: time="2025-05-17T00:42:02.364255925Z" level=info msg="CreateContainer within sandbox \"3cafacff5dd069919b1a05f2924297cf482f015737ac21e30865bbb626ef06a9\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"8fc8ac775a046eb69825054d80d928f1e8d337e160be613303795b295a4e3937\"" May 17 00:42:02.368753 env[1725]: time="2025-05-17T00:42:02.368702955Z" level=info msg="StartContainer for \"8fc8ac775a046eb69825054d80d928f1e8d337e160be613303795b295a4e3937\"" May 17 00:42:02.461867 systemd[1]: Started cri-containerd-8fc8ac775a046eb69825054d80d928f1e8d337e160be613303795b295a4e3937.scope. May 17 00:42:02.489823 kernel: kauditd_printk_skb: 68 callbacks suppressed May 17 00:42:02.489984 kernel: audit: type=1400 audit(1747442522.484:783): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.494328 kernel: audit: type=1400 audit(1747442522.484:784): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.496092 kernel: audit: type=1400 audit(1747442522.484:785): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.501643 kernel: audit: type=1400 audit(1747442522.484:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.501848 kernel: audit: type=1400 audit(1747442522.484:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.508866 kernel: audit: type=1400 audit(1747442522.484:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.512667 kernel: audit: type=1400 audit(1747442522.484:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.512836 kernel: audit: type=1400 audit(1747442522.484:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.512944 kubelet[2103]: E0517 00:42:02.510158 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:02.519869 kernel: audit: type=1400 audit(1747442522.484:791): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.526624 kernel: audit: type=1400 audit(1747442522.484:792): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit: BPF prog-id=128 op=LOAD May 17 00:42:02.484000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[3605]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3539 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866633861633737356130343665623639383235303534643830643932 May 17 00:42:02.484000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[3605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3539 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866633861633737356130343665623639383235303534643830643932 May 17 00:42:02.484000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.484000 audit: BPF prog-id=129 op=LOAD May 17 00:42:02.484000 audit[3605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028ea20 items=0 ppid=3539 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866633861633737356130343665623639383235303534643830643932 May 17 00:42:02.486000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.486000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.486000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.486000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.486000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.486000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.486000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.486000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.486000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.486000 audit: BPF prog-id=130 op=LOAD May 17 00:42:02.486000 audit[3605]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028ea68 items=0 ppid=3539 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866633861633737356130343665623639383235303534643830643932 May 17 00:42:02.489000 audit: BPF prog-id=130 op=UNLOAD May 17 00:42:02.489000 audit: BPF prog-id=129 op=UNLOAD May 17 00:42:02.489000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.489000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.489000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.489000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.489000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.489000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.489000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.489000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.489000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.489000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:02.489000 audit: BPF prog-id=131 op=LOAD May 17 00:42:02.489000 audit[3605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028ee78 items=0 ppid=3539 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866633861633737356130343665623639383235303534643830643932 May 17 00:42:02.595029 env[1725]: time="2025-05-17T00:42:02.594972235Z" level=info msg="StartContainer for \"8fc8ac775a046eb69825054d80d928f1e8d337e160be613303795b295a4e3937\" returns successfully" May 17 00:42:02.836000 audit[3632]: AVC avc: denied { search } for pid=3632 comm="rpcbind" name="crypto" dev="proc" ino=23341 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c607 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:42:02.836000 audit[3632]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fa390da80c0 a2=0 a3=0 items=0 ppid=3615 pid=3632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c607 key=(null) May 17 00:42:02.836000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 17 00:42:02.872884 kubelet[2103]: I0517 00:42:02.872803 2103 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.382631616 podStartE2EDuration="6.872780832s" podCreationTimestamp="2025-05-17 00:41:56 +0000 UTC" firstStartedPulling="2025-05-17 00:41:56.799811572 +0000 UTC m=+46.870487279" lastFinishedPulling="2025-05-17 00:42:02.289960784 +0000 UTC m=+52.360636495" observedRunningTime="2025-05-17 00:42:02.872692572 +0000 UTC m=+52.943368295" watchObservedRunningTime="2025-05-17 00:42:02.872780832 +0000 UTC m=+52.943456558" May 17 00:42:02.878000 audit[3637]: AVC avc: denied { search } for pid=3637 comm="dbus-daemon" name="crypto" dev="proc" ino=23341 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c607 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:42:02.878000 audit[3637]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff31c73e0c0 a2=0 a3=0 items=0 ppid=3615 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c607 key=(null) May 17 00:42:02.878000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:42:02.883000 audit[3638]: AVC avc: denied { watch } for pid=3638 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537493 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c607 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c51,c607 tclass=dir permissive=0 May 17 00:42:02.883000 audit[3638]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55c5b6753b50 a2=2c8 a3=7ffd4f637ecc items=0 ppid=3615 pid=3638 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c607 key=(null) May 17 00:42:02.883000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:42:02.888000 audit[3639]: AVC avc: denied { read } for pid=3639 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23372 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c607 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 17 00:42:02.888000 audit[3639]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f27f19c0320 a1=80000 a2=d a3=7ffd1f09c9f0 items=0 ppid=3615 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c607 key=(null) May 17 00:42:02.888000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:42:02.890000 audit[3639]: AVC avc: denied { search } for pid=3639 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23341 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c607 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:42:02.890000 audit[3639]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f27f0f140c0 a2=0 a3=0 items=0 ppid=3615 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c607 key=(null) May 17 00:42:02.890000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:42:02.959000 audit[3644]: NETFILTER_CFG table=filter:86 family=2 entries=24 op=nft_register_rule pid=3644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:02.959000 audit[3644]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffa2253e50 a2=0 a3=7fffa2253e3c items=0 ppid=2337 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:02.966000 audit[3644]: NETFILTER_CFG table=nat:87 family=2 entries=106 op=nft_register_chain pid=3644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:42:02.966000 audit[3644]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffa2253e50 a2=0 a3=7fffa2253e3c items=0 ppid=2337 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:02.966000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:03.511152 kubelet[2103]: E0517 00:42:03.511108 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:04.511802 kubelet[2103]: E0517 00:42:04.511761 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:05.512922 kubelet[2103]: E0517 00:42:05.512844 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:06.513039 kubelet[2103]: E0517 00:42:06.512983 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:07.513877 kubelet[2103]: E0517 00:42:07.513813 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:08.514049 kubelet[2103]: E0517 00:42:08.513993 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:09.514447 kubelet[2103]: E0517 00:42:09.514387 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:10.463016 kubelet[2103]: E0517 00:42:10.462976 2103 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:10.499740 env[1725]: time="2025-05-17T00:42:10.499709508Z" level=info msg="StopPodSandbox for \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\"" May 17 00:42:10.515372 kubelet[2103]: E0517 00:42:10.515329 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:10.587555 env[1725]: 2025-05-17 00:42:10.538 [WARNING][3663] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.18-k8s-csi--node--driver--h2g6f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c0886405-922a-42c7-b394-b5abf5ec9865", ResourceVersion:"1260", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.18", ContainerID:"822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756", Pod:"csi-node-driver-h2g6f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.19.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif36255af94c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:10.587555 env[1725]: 2025-05-17 00:42:10.539 [INFO][3663] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:42:10.587555 env[1725]: 2025-05-17 00:42:10.539 [INFO][3663] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" iface="eth0" netns="" May 17 00:42:10.587555 env[1725]: 2025-05-17 00:42:10.539 [INFO][3663] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:42:10.587555 env[1725]: 2025-05-17 00:42:10.539 [INFO][3663] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:42:10.587555 env[1725]: 2025-05-17 00:42:10.575 [INFO][3671] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" HandleID="k8s-pod-network.a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" Workload="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:42:10.587555 env[1725]: 2025-05-17 00:42:10.575 [INFO][3671] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:10.587555 env[1725]: 2025-05-17 00:42:10.575 [INFO][3671] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:10.587555 env[1725]: 2025-05-17 00:42:10.582 [WARNING][3671] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" HandleID="k8s-pod-network.a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" Workload="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:42:10.587555 env[1725]: 2025-05-17 00:42:10.582 [INFO][3671] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" HandleID="k8s-pod-network.a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" Workload="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:42:10.587555 env[1725]: 2025-05-17 00:42:10.584 [INFO][3671] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:10.587555 env[1725]: 2025-05-17 00:42:10.586 [INFO][3663] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:42:10.588419 env[1725]: time="2025-05-17T00:42:10.587598165Z" level=info msg="TearDown network for sandbox \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\" successfully" May 17 00:42:10.588419 env[1725]: time="2025-05-17T00:42:10.587634125Z" level=info msg="StopPodSandbox for \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\" returns successfully" May 17 00:42:10.588419 env[1725]: time="2025-05-17T00:42:10.588261936Z" level=info msg="RemovePodSandbox for \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\"" May 17 00:42:10.588419 env[1725]: time="2025-05-17T00:42:10.588298021Z" level=info msg="Forcibly stopping sandbox \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\"" May 17 00:42:10.679394 env[1725]: 2025-05-17 00:42:10.631 [WARNING][3686] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.18-k8s-csi--node--driver--h2g6f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c0886405-922a-42c7-b394-b5abf5ec9865", ResourceVersion:"1260", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.18", ContainerID:"822ce77eab883a15787190759fe01657e3d8c93a897c494eff31ef53f77e7756", Pod:"csi-node-driver-h2g6f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.19.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif36255af94c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:10.679394 env[1725]: 2025-05-17 00:42:10.631 [INFO][3686] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:42:10.679394 env[1725]: 2025-05-17 00:42:10.631 [INFO][3686] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" iface="eth0" netns="" May 17 00:42:10.679394 env[1725]: 2025-05-17 00:42:10.631 [INFO][3686] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:42:10.679394 env[1725]: 2025-05-17 00:42:10.631 [INFO][3686] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:42:10.679394 env[1725]: 2025-05-17 00:42:10.663 [INFO][3693] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" HandleID="k8s-pod-network.a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" Workload="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:42:10.679394 env[1725]: 2025-05-17 00:42:10.664 [INFO][3693] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:10.679394 env[1725]: 2025-05-17 00:42:10.664 [INFO][3693] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:10.679394 env[1725]: 2025-05-17 00:42:10.674 [WARNING][3693] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" HandleID="k8s-pod-network.a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" Workload="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:42:10.679394 env[1725]: 2025-05-17 00:42:10.674 [INFO][3693] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" HandleID="k8s-pod-network.a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" Workload="172.31.31.18-k8s-csi--node--driver--h2g6f-eth0" May 17 00:42:10.679394 env[1725]: 2025-05-17 00:42:10.676 [INFO][3693] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:10.679394 env[1725]: 2025-05-17 00:42:10.678 [INFO][3686] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc" May 17 00:42:10.679905 env[1725]: time="2025-05-17T00:42:10.679420834Z" level=info msg="TearDown network for sandbox \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\" successfully" May 17 00:42:10.682821 env[1725]: time="2025-05-17T00:42:10.682773377Z" level=info msg="RemovePodSandbox \"a79da231f1e30c7c6588e48915f6418924c6474c86864eb609c1ef8c946bfcdc\" returns successfully" May 17 00:42:10.683327 env[1725]: time="2025-05-17T00:42:10.683301245Z" level=info msg="StopPodSandbox for \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\"" May 17 00:42:10.765989 env[1725]: 2025-05-17 00:42:10.728 [WARNING][3709] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"8b92dfa6-8a61-41b6-965a-26f80820187b", ResourceVersion:"1281", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.18", ContainerID:"1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc", Pod:"nginx-deployment-7fcdb87857-zh7tm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali401fb7f01d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:10.765989 env[1725]: 2025-05-17 00:42:10.728 [INFO][3709] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:42:10.765989 env[1725]: 2025-05-17 00:42:10.728 [INFO][3709] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" iface="eth0" netns="" May 17 00:42:10.765989 env[1725]: 2025-05-17 00:42:10.728 [INFO][3709] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:42:10.765989 env[1725]: 2025-05-17 00:42:10.728 [INFO][3709] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:42:10.765989 env[1725]: 2025-05-17 00:42:10.749 [INFO][3716] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" HandleID="k8s-pod-network.76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" Workload="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:42:10.765989 env[1725]: 2025-05-17 00:42:10.749 [INFO][3716] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:10.765989 env[1725]: 2025-05-17 00:42:10.749 [INFO][3716] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:10.765989 env[1725]: 2025-05-17 00:42:10.760 [WARNING][3716] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" HandleID="k8s-pod-network.76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" Workload="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:42:10.765989 env[1725]: 2025-05-17 00:42:10.761 [INFO][3716] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" HandleID="k8s-pod-network.76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" Workload="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:42:10.765989 env[1725]: 2025-05-17 00:42:10.763 [INFO][3716] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:10.765989 env[1725]: 2025-05-17 00:42:10.764 [INFO][3709] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:42:10.766598 env[1725]: time="2025-05-17T00:42:10.766554256Z" level=info msg="TearDown network for sandbox \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\" successfully" May 17 00:42:10.766670 env[1725]: time="2025-05-17T00:42:10.766655371Z" level=info msg="StopPodSandbox for \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\" returns successfully" May 17 00:42:10.767284 env[1725]: time="2025-05-17T00:42:10.767261123Z" level=info msg="RemovePodSandbox for \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\"" May 17 00:42:10.767548 env[1725]: time="2025-05-17T00:42:10.767494086Z" level=info msg="Forcibly stopping sandbox \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\"" May 17 00:42:10.843657 env[1725]: 2025-05-17 00:42:10.807 [WARNING][3730] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"8b92dfa6-8a61-41b6-965a-26f80820187b", ResourceVersion:"1281", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.18", ContainerID:"1059841bf21e387e6c348091bca7bb19fe19dce97081fc4d139038039ef7a0fc", Pod:"nginx-deployment-7fcdb87857-zh7tm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali401fb7f01d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:10.843657 env[1725]: 2025-05-17 00:42:10.808 [INFO][3730] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:42:10.843657 env[1725]: 2025-05-17 00:42:10.808 [INFO][3730] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" iface="eth0" netns="" May 17 00:42:10.843657 env[1725]: 2025-05-17 00:42:10.808 [INFO][3730] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:42:10.843657 env[1725]: 2025-05-17 00:42:10.808 [INFO][3730] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:42:10.843657 env[1725]: 2025-05-17 00:42:10.830 [INFO][3737] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" HandleID="k8s-pod-network.76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" Workload="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:42:10.843657 env[1725]: 2025-05-17 00:42:10.830 [INFO][3737] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:10.843657 env[1725]: 2025-05-17 00:42:10.830 [INFO][3737] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:10.843657 env[1725]: 2025-05-17 00:42:10.838 [WARNING][3737] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" HandleID="k8s-pod-network.76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" Workload="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:42:10.843657 env[1725]: 2025-05-17 00:42:10.838 [INFO][3737] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" HandleID="k8s-pod-network.76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" Workload="172.31.31.18-k8s-nginx--deployment--7fcdb87857--zh7tm-eth0" May 17 00:42:10.843657 env[1725]: 2025-05-17 00:42:10.840 [INFO][3737] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:10.843657 env[1725]: 2025-05-17 00:42:10.842 [INFO][3730] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304" May 17 00:42:10.844205 env[1725]: time="2025-05-17T00:42:10.843685445Z" level=info msg="TearDown network for sandbox \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\" successfully" May 17 00:42:10.846262 env[1725]: time="2025-05-17T00:42:10.846227005Z" level=info msg="RemovePodSandbox \"76fe0213fbdd16791a970d02e9854fa8294211c71799d76fedc402c3ca80f304\" returns successfully" May 17 00:42:11.516067 kubelet[2103]: E0517 00:42:11.516025 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:12.517055 kubelet[2103]: E0517 00:42:12.517017 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:13.517878 kubelet[2103]: E0517 00:42:13.517838 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:14.518453 kubelet[2103]: E0517 00:42:14.518393 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:15.519509 kubelet[2103]: E0517 00:42:15.519469 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:16.520563 kubelet[2103]: E0517 00:42:16.520498 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:17.521264 kubelet[2103]: E0517 00:42:17.521201 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:18.522238 kubelet[2103]: E0517 00:42:18.522198 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:19.522763 kubelet[2103]: E0517 00:42:19.522722 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:20.523168 kubelet[2103]: E0517 00:42:20.523130 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:21.523367 kubelet[2103]: E0517 00:42:21.523298 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:22.523719 kubelet[2103]: E0517 00:42:22.523648 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:23.524362 kubelet[2103]: E0517 00:42:23.524318 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:24.525443 kubelet[2103]: E0517 00:42:24.525370 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:25.526314 kubelet[2103]: E0517 00:42:25.526274 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:26.527265 kubelet[2103]: E0517 00:42:26.527205 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:27.528393 kubelet[2103]: E0517 00:42:27.528349 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:27.884009 systemd[1]: Created slice kubepods-besteffort-pod54c65e42_302f_4883_a410_dbae6a45373d.slice. May 17 00:42:28.083569 kubelet[2103]: I0517 00:42:28.083522 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-30ecdde0-7b90-46e4-b501-f3c82d625733\" (UniqueName: \"kubernetes.io/nfs/54c65e42-302f-4883-a410-dbae6a45373d-pvc-30ecdde0-7b90-46e4-b501-f3c82d625733\") pod \"test-pod-1\" (UID: \"54c65e42-302f-4883-a410-dbae6a45373d\") " pod="default/test-pod-1" May 17 00:42:28.083569 kubelet[2103]: I0517 00:42:28.083573 2103 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rxncd\" (UniqueName: \"kubernetes.io/projected/54c65e42-302f-4883-a410-dbae6a45373d-kube-api-access-rxncd\") pod \"test-pod-1\" (UID: \"54c65e42-302f-4883-a410-dbae6a45373d\") " pod="default/test-pod-1" May 17 00:42:28.227932 kernel: Failed to create system directory netfs May 17 00:42:28.228075 kernel: kauditd_printk_skb: 68 callbacks suppressed May 17 00:42:28.228108 kernel: audit: type=1400 audit(1747442548.216:808): avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.228133 kernel: Failed to create system directory netfs May 17 00:42:28.228151 kernel: audit: type=1400 audit(1747442548.216:808): avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.228169 kernel: Failed to create system directory netfs May 17 00:42:28.216000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.216000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.234901 kernel: audit: type=1400 audit(1747442548.216:808): avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.234994 kernel: Failed to create system directory netfs May 17 00:42:28.216000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.247123 kernel: audit: type=1400 audit(1747442548.216:808): avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.216000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.216000 audit[3763]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=565404f325e0 a1=153bc a2=5653f6c472b0 a3=5 items=0 ppid=482 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:28.264795 kernel: audit: type=1300 audit(1747442548.216:808): arch=c000003e syscall=175 success=yes exit=0 a0=565404f325e0 a1=153bc a2=5653f6c472b0 a3=5 items=0 ppid=482 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:28.264926 kernel: audit: type=1327 audit(1747442548.216:808): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:42:28.216000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:42:28.276659 kernel: Failed to create system directory fscache May 17 00:42:28.276782 kernel: audit: type=1400 audit(1747442548.266:809): avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.276806 kernel: Failed to create system directory fscache May 17 00:42:28.276827 kernel: Failed to create system directory fscache May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.279455 kernel: audit: type=1400 audit(1747442548.266:809): avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.279556 kernel: Failed to create system directory fscache May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.286186 kernel: audit: type=1400 audit(1747442548.266:809): avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.286271 kernel: Failed to create system directory fscache May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.292856 kernel: audit: type=1400 audit(1747442548.266:809): avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.292916 kernel: Failed to create system directory fscache May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.300974 kernel: Failed to create system directory fscache May 17 00:42:28.301074 kernel: Failed to create system directory fscache May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.303707 kernel: Failed to create system directory fscache May 17 00:42:28.303793 kernel: Failed to create system directory fscache May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.306384 kernel: Failed to create system directory fscache May 17 00:42:28.306473 kernel: Failed to create system directory fscache May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.309057 kernel: Failed to create system directory fscache May 17 00:42:28.309141 kernel: Failed to create system directory fscache May 17 00:42:28.266000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.266000 audit[3763]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5654051479c0 a1=4c0fc a2=5653f6c472b0 a3=5 items=0 ppid=482 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:28.266000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:42:28.313464 kernel: FS-Cache: Loaded May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.352472 kernel: Failed to create system directory sunrpc May 17 00:42:28.352570 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.355018 kernel: Failed to create system directory sunrpc May 17 00:42:28.355113 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.357398 kernel: Failed to create system directory sunrpc May 17 00:42:28.357476 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.359694 kernel: Failed to create system directory sunrpc May 17 00:42:28.359766 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.362368 kernel: Failed to create system directory sunrpc May 17 00:42:28.362449 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.364796 kernel: Failed to create system directory sunrpc May 17 00:42:28.364877 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.367087 kernel: Failed to create system directory sunrpc May 17 00:42:28.367139 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.369351 kernel: Failed to create system directory sunrpc May 17 00:42:28.369401 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.371578 kernel: Failed to create system directory sunrpc May 17 00:42:28.371648 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.373715 kernel: Failed to create system directory sunrpc May 17 00:42:28.373764 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.375792 kernel: Failed to create system directory sunrpc May 17 00:42:28.375856 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.377782 kernel: Failed to create system directory sunrpc May 17 00:42:28.377845 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.379695 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.380668 kernel: Failed to create system directory sunrpc May 17 00:42:28.380727 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.382496 kernel: Failed to create system directory sunrpc May 17 00:42:28.382538 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.384304 kernel: Failed to create system directory sunrpc May 17 00:42:28.384342 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.386153 kernel: Failed to create system directory sunrpc May 17 00:42:28.386202 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.387971 kernel: Failed to create system directory sunrpc May 17 00:42:28.388015 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.389806 kernel: Failed to create system directory sunrpc May 17 00:42:28.389857 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.391598 kernel: Failed to create system directory sunrpc May 17 00:42:28.391638 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.394272 kernel: Failed to create system directory sunrpc May 17 00:42:28.394311 kernel: Failed to create system directory sunrpc May 17 00:42:28.394349 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.396053 kernel: Failed to create system directory sunrpc May 17 00:42:28.396090 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.397848 kernel: Failed to create system directory sunrpc May 17 00:42:28.397897 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.399657 kernel: Failed to create system directory sunrpc May 17 00:42:28.399719 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.401495 kernel: Failed to create system directory sunrpc May 17 00:42:28.401544 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.403271 kernel: Failed to create system directory sunrpc May 17 00:42:28.403316 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.404180 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.405945 kernel: Failed to create system directory sunrpc May 17 00:42:28.405990 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.407730 kernel: Failed to create system directory sunrpc May 17 00:42:28.407786 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.409511 kernel: Failed to create system directory sunrpc May 17 00:42:28.409565 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.411308 kernel: Failed to create system directory sunrpc May 17 00:42:28.411357 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.413088 kernel: Failed to create system directory sunrpc May 17 00:42:28.413143 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.414873 kernel: Failed to create system directory sunrpc May 17 00:42:28.414931 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.416662 kernel: Failed to create system directory sunrpc May 17 00:42:28.416706 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.418458 kernel: Failed to create system directory sunrpc May 17 00:42:28.418522 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.420255 kernel: Failed to create system directory sunrpc May 17 00:42:28.420305 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.422058 kernel: Failed to create system directory sunrpc May 17 00:42:28.422105 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.423888 kernel: Failed to create system directory sunrpc May 17 00:42:28.423961 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.425669 kernel: Failed to create system directory sunrpc May 17 00:42:28.425746 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.428331 kernel: Failed to create system directory sunrpc May 17 00:42:28.428383 kernel: Failed to create system directory sunrpc May 17 00:42:28.428420 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.430047 kernel: Failed to create system directory sunrpc May 17 00:42:28.430098 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.431859 kernel: Failed to create system directory sunrpc May 17 00:42:28.431914 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.433606 kernel: Failed to create system directory sunrpc May 17 00:42:28.433654 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.436289 kernel: Failed to create system directory sunrpc May 17 00:42:28.436338 kernel: Failed to create system directory sunrpc May 17 00:42:28.436376 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.438095 kernel: Failed to create system directory sunrpc May 17 00:42:28.438156 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.439850 kernel: Failed to create system directory sunrpc May 17 00:42:28.439901 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.441602 kernel: Failed to create system directory sunrpc May 17 00:42:28.441645 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.444278 kernel: Failed to create system directory sunrpc May 17 00:42:28.444339 kernel: Failed to create system directory sunrpc May 17 00:42:28.444367 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.445165 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.446067 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.446931 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.447822 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.448682 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.449622 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.450490 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.452260 kernel: Failed to create system directory sunrpc May 17 00:42:28.452333 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.454038 kernel: Failed to create system directory sunrpc May 17 00:42:28.454082 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.455804 kernel: Failed to create system directory sunrpc May 17 00:42:28.455860 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.457565 kernel: Failed to create system directory sunrpc May 17 00:42:28.457606 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.459348 kernel: Failed to create system directory sunrpc May 17 00:42:28.459396 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.461181 kernel: Failed to create system directory sunrpc May 17 00:42:28.461241 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.462870 kernel: Failed to create system directory sunrpc May 17 00:42:28.462926 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.464656 kernel: Failed to create system directory sunrpc May 17 00:42:28.464697 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.467333 kernel: Failed to create system directory sunrpc May 17 00:42:28.467378 kernel: Failed to create system directory sunrpc May 17 00:42:28.467423 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.469072 kernel: Failed to create system directory sunrpc May 17 00:42:28.469125 kernel: Failed to create system directory sunrpc May 17 00:42:28.336000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.482892 kernel: RPC: Registered named UNIX socket transport module. May 17 00:42:28.483005 kernel: RPC: Registered udp transport module. May 17 00:42:28.483046 kernel: RPC: Registered tcp transport module. May 17 00:42:28.483068 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 17 00:42:28.336000 audit[3763]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=565405193ad0 a1=1a814c a2=5653f6c472b0 a3=5 items=6 ppid=482 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:28.336000 audit: CWD cwd="/" May 17 00:42:28.336000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:28.336000 audit: PATH item=1 name=(null) inode=23552 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:28.336000 audit: PATH item=2 name=(null) inode=23552 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:28.336000 audit: PATH item=3 name=(null) inode=24577 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:28.336000 audit: PATH item=4 name=(null) inode=23552 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:28.336000 audit: PATH item=5 name=(null) inode=24578 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:28.336000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:42:28.529343 kubelet[2103]: E0517 00:42:28.529262 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.534209 kernel: Failed to create system directory nfs May 17 00:42:28.534258 kernel: Failed to create system directory nfs May 17 00:42:28.534296 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.535053 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.535812 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.536738 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.537467 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.539187 kernel: Failed to create system directory nfs May 17 00:42:28.539231 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.540009 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.540825 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.541769 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.542543 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.544202 kernel: Failed to create system directory nfs May 17 00:42:28.544254 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.545050 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.545823 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.546709 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.548564 kernel: Failed to create system directory nfs May 17 00:42:28.548628 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.550305 kernel: Failed to create system directory nfs May 17 00:42:28.550350 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.552047 kernel: Failed to create system directory nfs May 17 00:42:28.552105 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.553844 kernel: Failed to create system directory nfs May 17 00:42:28.553927 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.555630 kernel: Failed to create system directory nfs May 17 00:42:28.555705 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.558362 kernel: Failed to create system directory nfs May 17 00:42:28.558455 kernel: Failed to create system directory nfs May 17 00:42:28.558486 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.560161 kernel: Failed to create system directory nfs May 17 00:42:28.560244 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.561926 kernel: Failed to create system directory nfs May 17 00:42:28.561980 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.563677 kernel: Failed to create system directory nfs May 17 00:42:28.563722 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.566261 kernel: Failed to create system directory nfs May 17 00:42:28.566310 kernel: Failed to create system directory nfs May 17 00:42:28.566377 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.567977 kernel: Failed to create system directory nfs May 17 00:42:28.568052 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.569944 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.570941 kernel: Failed to create system directory nfs May 17 00:42:28.571076 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.572745 kernel: Failed to create system directory nfs May 17 00:42:28.572789 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.574638 kernel: Failed to create system directory nfs May 17 00:42:28.574722 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.575518 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.577265 kernel: Failed to create system directory nfs May 17 00:42:28.577307 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.578119 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.578984 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.579857 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.580734 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.581592 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.583305 kernel: Failed to create system directory nfs May 17 00:42:28.583378 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.521000 audit[3763]: AVC avc: denied { confidentiality } for pid=3763 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.585011 kernel: Failed to create system directory nfs May 17 00:42:28.521000 audit[3763]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5654053b4a10 a1=16eae4 a2=5653f6c472b0 a3=5 items=0 ppid=482 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:28.607465 kernel: FS-Cache: Netfs 'nfs' registered for caching May 17 00:42:28.521000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.658777 kernel: Failed to create system directory nfs4 May 17 00:42:28.658885 kernel: Failed to create system directory nfs4 May 17 00:42:28.658921 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.660590 kernel: Failed to create system directory nfs4 May 17 00:42:28.660658 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.662364 kernel: Failed to create system directory nfs4 May 17 00:42:28.662447 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.664181 kernel: Failed to create system directory nfs4 May 17 00:42:28.664240 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.665976 kernel: Failed to create system directory nfs4 May 17 00:42:28.666023 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.667783 kernel: Failed to create system directory nfs4 May 17 00:42:28.667865 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.669583 kernel: Failed to create system directory nfs4 May 17 00:42:28.669625 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.670515 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.672345 kernel: Failed to create system directory nfs4 May 17 00:42:28.672437 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.673270 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.674211 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.675167 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.676103 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.677037 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.677984 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.678919 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.679863 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.681789 kernel: Failed to create system directory nfs4 May 17 00:42:28.681837 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.683551 kernel: Failed to create system directory nfs4 May 17 00:42:28.683596 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.684490 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.686373 kernel: Failed to create system directory nfs4 May 17 00:42:28.686452 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.687304 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.689137 kernel: Failed to create system directory nfs4 May 17 00:42:28.689186 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.690076 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.691109 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.691862 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.692745 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.694540 kernel: Failed to create system directory nfs4 May 17 00:42:28.694590 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.696333 kernel: Failed to create system directory nfs4 May 17 00:42:28.696380 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.697224 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.698117 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.699013 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.699905 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.700807 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.701826 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.703496 kernel: Failed to create system directory nfs4 May 17 00:42:28.703536 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.705301 kernel: Failed to create system directory nfs4 May 17 00:42:28.705342 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.706204 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.707114 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.708013 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.708925 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.709863 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.711644 kernel: Failed to create system directory nfs4 May 17 00:42:28.711688 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.712543 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.714297 kernel: Failed to create system directory nfs4 May 17 00:42:28.714372 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.716084 kernel: Failed to create system directory nfs4 May 17 00:42:28.716153 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.717911 kernel: Failed to create system directory nfs4 May 17 00:42:28.717983 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.718830 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.720597 kernel: Failed to create system directory nfs4 May 17 00:42:28.720673 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.723310 kernel: Failed to create system directory nfs4 May 17 00:42:28.723350 kernel: Failed to create system directory nfs4 May 17 00:42:28.723393 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.725028 kernel: Failed to create system directory nfs4 May 17 00:42:28.725097 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.725942 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.727705 kernel: Failed to create system directory nfs4 May 17 00:42:28.727761 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.730371 kernel: Failed to create system directory nfs4 May 17 00:42:28.730441 kernel: Failed to create system directory nfs4 May 17 00:42:28.730488 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.731174 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.732077 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.732973 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.733881 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.740524 kernel: Failed to create system directory nfs4 May 17 00:42:28.740576 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.741890 kernel: Failed to create system directory nfs4 May 17 00:42:28.741967 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.743640 kernel: Failed to create system directory nfs4 May 17 00:42:28.743680 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.744543 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.745500 kernel: Failed to create system directory nfs4 May 17 00:42:28.640000 audit[3769]: AVC avc: denied { confidentiality } for pid=3769 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.896784 kernel: NFS: Registering the id_resolver key type May 17 00:42:28.896909 kernel: Key type id_resolver registered May 17 00:42:28.896955 kernel: Key type id_legacy registered May 17 00:42:28.640000 audit[3769]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f59f03f5010 a1=209404 a2=55b08cee32b0 a3=5 items=0 ppid=482 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:28.640000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.913468 kernel: Failed to create system directory rpcgss May 17 00:42:28.913531 kernel: Failed to create system directory rpcgss May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.915333 kernel: Failed to create system directory rpcgss May 17 00:42:28.915378 kernel: Failed to create system directory rpcgss May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.917199 kernel: Failed to create system directory rpcgss May 17 00:42:28.917240 kernel: Failed to create system directory rpcgss May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.919059 kernel: Failed to create system directory rpcgss May 17 00:42:28.919109 kernel: Failed to create system directory rpcgss May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.920904 kernel: Failed to create system directory rpcgss May 17 00:42:28.920977 kernel: Failed to create system directory rpcgss May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.922762 kernel: Failed to create system directory rpcgss May 17 00:42:28.922812 kernel: Failed to create system directory rpcgss May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.924596 kernel: Failed to create system directory rpcgss May 17 00:42:28.924644 kernel: Failed to create system directory rpcgss May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.926454 kernel: Failed to create system directory rpcgss May 17 00:42:28.926519 kernel: Failed to create system directory rpcgss May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.928253 kernel: Failed to create system directory rpcgss May 17 00:42:28.928299 kernel: Failed to create system directory rpcgss May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.930130 kernel: Failed to create system directory rpcgss May 17 00:42:28.930196 kernel: Failed to create system directory rpcgss May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.931997 kernel: Failed to create system directory rpcgss May 17 00:42:28.932051 kernel: Failed to create system directory rpcgss May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.933859 kernel: Failed to create system directory rpcgss May 17 00:42:28.933916 kernel: Failed to create system directory rpcgss May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.935708 kernel: Failed to create system directory rpcgss May 17 00:42:28.935755 kernel: Failed to create system directory rpcgss May 17 00:42:28.908000 audit[3770]: AVC avc: denied { confidentiality } for pid=3770 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:28.908000 audit[3770]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fed52332010 a1=70b64 a2=5637862fa2b0 a3=5 items=0 ppid=482 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:28.908000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 17 00:42:29.038913 nfsidmap[3777]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' May 17 00:42:29.043065 nfsidmap[3778]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' May 17 00:42:29.055000 audit[1918]: AVC avc: denied { watch_reads } for pid=1918 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2880 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:42:29.055000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55dcc0e3f280 a2=10 a3=3756e9c08e6c12d6 items=0 ppid=1 pid=1918 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.055000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:42:29.055000 audit[1918]: AVC avc: denied { watch_reads } for pid=1918 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2880 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:42:29.055000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55dcc0e3f280 a2=10 a3=3756e9c08e6c12d6 items=0 ppid=1 pid=1918 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.055000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:42:29.055000 audit[1918]: AVC avc: denied { watch_reads } for pid=1918 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2880 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:42:29.055000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55dcc0e3f280 a2=10 a3=3756e9c08e6c12d6 items=0 ppid=1 pid=1918 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.055000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:42:29.056000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2880 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:42:29.056000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2880 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:42:29.056000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2880 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:42:29.092312 env[1725]: time="2025-05-17T00:42:29.092215783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:54c65e42-302f-4883-a410-dbae6a45373d,Namespace:default,Attempt:0,}" May 17 00:42:29.246142 (udev-worker)[3765]: Network interface NamePolicy= disabled on kernel command line. May 17 00:42:29.246752 systemd-networkd[1442]: cali5ec59c6bf6e: Link UP May 17 00:42:29.250644 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:42:29.250708 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 17 00:42:29.250045 systemd-networkd[1442]: cali5ec59c6bf6e: Gained carrier May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.152 [INFO][3779] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.31.18-k8s-test--pod--1-eth0 default 54c65e42-302f-4883-a410-dbae6a45373d 1471 0 2025-05-17 00:41:57 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.31.18 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.18-k8s-test--pod--1-" May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.152 [INFO][3779] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.18-k8s-test--pod--1-eth0" May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.178 [INFO][3792] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" HandleID="k8s-pod-network.daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" Workload="172.31.31.18-k8s-test--pod--1-eth0" May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.178 [INFO][3792] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" HandleID="k8s-pod-network.daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" Workload="172.31.31.18-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d3020), Attrs:map[string]string{"namespace":"default", "node":"172.31.31.18", "pod":"test-pod-1", "timestamp":"2025-05-17 00:42:29.178543905 +0000 UTC"}, Hostname:"172.31.31.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.178 [INFO][3792] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.178 [INFO][3792] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.178 [INFO][3792] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.31.18' May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.202 [INFO][3792] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" host="172.31.31.18" May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.210 [INFO][3792] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.31.18" May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.216 [INFO][3792] ipam/ipam.go 511: Trying affinity for 192.168.19.192/26 host="172.31.31.18" May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.218 [INFO][3792] ipam/ipam.go 158: Attempting to load block cidr=192.168.19.192/26 host="172.31.31.18" May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.222 [INFO][3792] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.19.192/26 host="172.31.31.18" May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.222 [INFO][3792] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.19.192/26 handle="k8s-pod-network.daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" host="172.31.31.18" May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.225 [INFO][3792] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3 May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.230 [INFO][3792] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.19.192/26 handle="k8s-pod-network.daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" host="172.31.31.18" May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.241 [INFO][3792] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.19.196/26] block=192.168.19.192/26 handle="k8s-pod-network.daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" host="172.31.31.18" May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.242 [INFO][3792] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.19.196/26] handle="k8s-pod-network.daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" host="172.31.31.18" May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.242 [INFO][3792] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.242 [INFO][3792] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.19.196/26] IPv6=[] ContainerID="daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" HandleID="k8s-pod-network.daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" Workload="172.31.31.18-k8s-test--pod--1-eth0" May 17 00:42:29.267616 env[1725]: 2025-05-17 00:42:29.243 [INFO][3779] cni-plugin/k8s.go 418: Populated endpoint ContainerID="daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.18-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.18-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"54c65e42-302f-4883-a410-dbae6a45373d", ResourceVersion:"1471", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.18", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:29.268357 env[1725]: 2025-05-17 00:42:29.243 [INFO][3779] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.19.196/32] ContainerID="daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.18-k8s-test--pod--1-eth0" May 17 00:42:29.268357 env[1725]: 2025-05-17 00:42:29.243 [INFO][3779] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.18-k8s-test--pod--1-eth0" May 17 00:42:29.268357 env[1725]: 2025-05-17 00:42:29.251 [INFO][3779] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.18-k8s-test--pod--1-eth0" May 17 00:42:29.268357 env[1725]: 2025-05-17 00:42:29.251 [INFO][3779] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.18-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.31.18-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"54c65e42-302f-4883-a410-dbae6a45373d", ResourceVersion:"1471", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.31.18", ContainerID:"daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"a6:17:8b:21:4d:43", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:29.268357 env[1725]: 2025-05-17 00:42:29.266 [INFO][3779] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.31.18-k8s-test--pod--1-eth0" May 17 00:42:29.277917 env[1725]: time="2025-05-17T00:42:29.277846059Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:29.277917 env[1725]: time="2025-05-17T00:42:29.277890062Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:29.278129 env[1725]: time="2025-05-17T00:42:29.277901226Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:29.278129 env[1725]: time="2025-05-17T00:42:29.278044988Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3 pid=3813 runtime=io.containerd.runc.v2 May 17 00:42:29.298549 systemd[1]: Started cri-containerd-daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3.scope. May 17 00:42:29.308000 audit[3836]: NETFILTER_CFG table=filter:88 family=2 entries=40 op=nft_register_chain pid=3836 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:29.308000 audit[3836]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc613c85d0 a2=0 a3=7ffc613c85bc items=0 ppid=2750 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.308000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:29.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.315000 audit: BPF prog-id=132 op=LOAD May 17 00:42:29.316000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.316000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3813 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656338653935373263373862383934303230623334613664623037 May 17 00:42:29.316000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.316000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3813 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656338653935373263373862383934303230623334613664623037 May 17 00:42:29.316000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.316000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.316000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.316000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.316000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.316000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.316000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.316000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.316000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.316000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.316000 audit: BPF prog-id=133 op=LOAD May 17 00:42:29.316000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000371fa0 items=0 ppid=3813 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656338653935373263373862383934303230623334613664623037 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit: BPF prog-id=134 op=LOAD May 17 00:42:29.317000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000371fe8 items=0 ppid=3813 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656338653935373263373862383934303230623334613664623037 May 17 00:42:29.317000 audit: BPF prog-id=134 op=UNLOAD May 17 00:42:29.317000 audit: BPF prog-id=133 op=UNLOAD May 17 00:42:29.317000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.317000 audit: BPF prog-id=135 op=LOAD May 17 00:42:29.317000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ee3f8 items=0 ppid=3813 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656338653935373263373862383934303230623334613664623037 May 17 00:42:29.350612 env[1725]: time="2025-05-17T00:42:29.350571105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:54c65e42-302f-4883-a410-dbae6a45373d,Namespace:default,Attempt:0,} returns sandbox id \"daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3\"" May 17 00:42:29.351970 env[1725]: time="2025-05-17T00:42:29.351938195Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:42:29.530256 kubelet[2103]: E0517 00:42:29.530216 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:29.653559 env[1725]: time="2025-05-17T00:42:29.653453520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:29.655720 env[1725]: time="2025-05-17T00:42:29.655692610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:29.657777 env[1725]: time="2025-05-17T00:42:29.657738895Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:29.659745 env[1725]: time="2025-05-17T00:42:29.659713244Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:29.660316 env[1725]: time="2025-05-17T00:42:29.660287016Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:42:29.662643 env[1725]: time="2025-05-17T00:42:29.662608754Z" level=info msg="CreateContainer within sandbox \"daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 17 00:42:29.678025 env[1725]: time="2025-05-17T00:42:29.677953805Z" level=info msg="CreateContainer within sandbox \"daec8e9572c78b894020b34a6db07d83124b6156f44a8e641b87efc345ead0a3\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"c6f348c975311863efe41d404bba2152e9751272b0af4ac33e263ac2f21a90e6\"" May 17 00:42:29.679342 env[1725]: time="2025-05-17T00:42:29.679309205Z" level=info msg="StartContainer for \"c6f348c975311863efe41d404bba2152e9751272b0af4ac33e263ac2f21a90e6\"" May 17 00:42:29.695704 systemd[1]: Started cri-containerd-c6f348c975311863efe41d404bba2152e9751272b0af4ac33e263ac2f21a90e6.scope. May 17 00:42:29.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.709000 audit: BPF prog-id=136 op=LOAD May 17 00:42:29.709000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.709000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3813 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336663334386339373533313138363365666534316434303462626132 May 17 00:42:29.709000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.709000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3813 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336663334386339373533313138363365666534316434303462626132 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit: BPF prog-id=137 op=LOAD May 17 00:42:29.710000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002d7d10 items=0 ppid=3813 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336663334386339373533313138363365666534316434303462626132 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.710000 audit: BPF prog-id=138 op=LOAD May 17 00:42:29.710000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002d7d58 items=0 ppid=3813 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336663334386339373533313138363365666534316434303462626132 May 17 00:42:29.711000 audit: BPF prog-id=138 op=UNLOAD May 17 00:42:29.711000 audit: BPF prog-id=137 op=UNLOAD May 17 00:42:29.711000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.711000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.711000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.711000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.711000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.711000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.711000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.711000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.711000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.711000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:29.711000 audit: BPF prog-id=139 op=LOAD May 17 00:42:29.711000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00033c168 items=0 ppid=3813 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:29.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336663334386339373533313138363365666534316434303462626132 May 17 00:42:29.729157 env[1725]: time="2025-05-17T00:42:29.728952210Z" level=info msg="StartContainer for \"c6f348c975311863efe41d404bba2152e9751272b0af4ac33e263ac2f21a90e6\" returns successfully" May 17 00:42:30.462296 kubelet[2103]: E0517 00:42:30.462244 2103 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:30.531359 kubelet[2103]: E0517 00:42:30.531308 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:30.555700 systemd-networkd[1442]: cali5ec59c6bf6e: Gained IPv6LL May 17 00:42:30.712865 systemd[1]: run-containerd-runc-k8s.io-3d2720a5d725620a80bee3ca06a638d61cc58683caf277bb268c16457a60d694-runc.HZwS47.mount: Deactivated successfully. May 17 00:42:31.532117 kubelet[2103]: E0517 00:42:31.532067 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:32.532805 kubelet[2103]: E0517 00:42:32.532766 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:33.533592 kubelet[2103]: E0517 00:42:33.533543 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:34.533972 kubelet[2103]: E0517 00:42:34.533903 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:35.534947 kubelet[2103]: E0517 00:42:35.534899 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:36.535896 kubelet[2103]: E0517 00:42:36.535854 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:37.537029 kubelet[2103]: E0517 00:42:37.536979 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:38.537342 kubelet[2103]: E0517 00:42:38.537267 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:39.538187 kubelet[2103]: E0517 00:42:39.538142 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:40.539296 kubelet[2103]: E0517 00:42:40.539254 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:41.540262 kubelet[2103]: E0517 00:42:41.540191 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:42.541970 kubelet[2103]: E0517 00:42:42.541915 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:43.542149 kubelet[2103]: E0517 00:42:43.542091 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:44.542616 kubelet[2103]: E0517 00:42:44.542565 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:45.543480 kubelet[2103]: E0517 00:42:45.543419 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:46.544009 kubelet[2103]: E0517 00:42:46.543932 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:47.545083 kubelet[2103]: E0517 00:42:47.545029 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:48.546238 kubelet[2103]: E0517 00:42:48.546193 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:49.547046 kubelet[2103]: E0517 00:42:49.546995 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:50.462826 kubelet[2103]: E0517 00:42:50.462778 2103 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:50.547172 kubelet[2103]: E0517 00:42:50.547117 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:51.547858 kubelet[2103]: E0517 00:42:51.547788 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:52.539383 kubelet[2103]: E0517 00:42:52.539303 2103 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.18?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" May 17 00:42:52.548395 kubelet[2103]: E0517 00:42:52.548355 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:53.549561 kubelet[2103]: E0517 00:42:53.549486 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:54.550671 kubelet[2103]: E0517 00:42:54.550617 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:55.551523 kubelet[2103]: E0517 00:42:55.551455 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:56.551966 kubelet[2103]: E0517 00:42:56.551917 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:57.553038 kubelet[2103]: E0517 00:42:57.552982 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:58.553499 kubelet[2103]: E0517 00:42:58.553453 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:59.554255 kubelet[2103]: E0517 00:42:59.554199 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:00.554799 kubelet[2103]: E0517 00:43:00.554693 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:00.712949 systemd[1]: run-containerd-runc-k8s.io-3d2720a5d725620a80bee3ca06a638d61cc58683caf277bb268c16457a60d694-runc.BhK8VN.mount: Deactivated successfully. May 17 00:43:01.555663 kubelet[2103]: E0517 00:43:01.555605 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:02.540622 kubelet[2103]: E0517 00:43:02.540563 2103 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.18?timeout=10s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" May 17 00:43:02.555787 kubelet[2103]: E0517 00:43:02.555729 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:03.556652 kubelet[2103]: E0517 00:43:03.556490 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:04.556893 kubelet[2103]: E0517 00:43:04.556841 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:05.557551 kubelet[2103]: E0517 00:43:05.557510 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:06.558247 kubelet[2103]: E0517 00:43:06.558180 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:07.558588 kubelet[2103]: E0517 00:43:07.558545 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:08.559351 kubelet[2103]: E0517 00:43:08.559310 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:09.560412 kubelet[2103]: E0517 00:43:09.560368 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:10.462254 kubelet[2103]: E0517 00:43:10.462200 2103 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:10.560719 kubelet[2103]: E0517 00:43:10.560654 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:11.560869 kubelet[2103]: E0517 00:43:11.560826 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:12.541612 kubelet[2103]: E0517 00:43:12.541553 2103 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.18?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" May 17 00:43:12.561480 kubelet[2103]: E0517 00:43:12.561420 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:13.562214 kubelet[2103]: E0517 00:43:13.562160 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:14.563071 kubelet[2103]: E0517 00:43:14.563030 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:15.563200 kubelet[2103]: E0517 00:43:15.563158 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:15.990155 kubelet[2103]: E0517 00:43:15.989035 2103 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.18?timeout=10s\": unexpected EOF" May 17 00:43:15.991915 kubelet[2103]: E0517 00:43:15.991886 2103 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.18?timeout=10s\": dial tcp 172.31.25.158:6443: connect: connection refused" May 17 00:43:15.992033 kubelet[2103]: I0517 00:43:15.991915 2103 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" May 17 00:43:15.993612 kubelet[2103]: E0517 00:43:15.992202 2103 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.18?timeout=10s\": dial tcp 172.31.25.158:6443: connect: connection refused" interval="200ms" May 17 00:43:16.194886 kubelet[2103]: E0517 00:43:16.194847 2103 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.18?timeout=10s\": dial tcp 172.31.25.158:6443: connect: connection refused" interval="400ms" May 17 00:43:16.563666 kubelet[2103]: E0517 00:43:16.563580 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:16.595719 kubelet[2103]: E0517 00:43:16.595655 2103 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.18?timeout=10s\": dial tcp 172.31.25.158:6443: connect: connection refused" interval="800ms" May 17 00:43:17.564440 kubelet[2103]: E0517 00:43:17.564399 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:18.564871 kubelet[2103]: E0517 00:43:18.564828 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:19.565870 kubelet[2103]: E0517 00:43:19.565818 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:20.566759 kubelet[2103]: E0517 00:43:20.566708 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:21.567370 kubelet[2103]: E0517 00:43:21.567308 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:22.567769 kubelet[2103]: E0517 00:43:22.567717 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:23.568384 kubelet[2103]: E0517 00:43:23.568297 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:24.569395 kubelet[2103]: E0517 00:43:24.569346 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:25.570394 kubelet[2103]: E0517 00:43:25.570323 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:26.570913 kubelet[2103]: E0517 00:43:26.570871 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:27.396970 kubelet[2103]: E0517 00:43:27.396915 2103 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.18?timeout=10s\": context deadline exceeded" interval="1.6s" May 17 00:43:27.571699 kubelet[2103]: E0517 00:43:27.571656 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:28.572541 kubelet[2103]: E0517 00:43:28.572500 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:29.572992 kubelet[2103]: E0517 00:43:29.572949 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:30.462864 kubelet[2103]: E0517 00:43:30.462811 2103 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:30.573412 kubelet[2103]: E0517 00:43:30.573367 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:30.717673 systemd[1]: run-containerd-runc-k8s.io-3d2720a5d725620a80bee3ca06a638d61cc58683caf277bb268c16457a60d694-runc.bUn4Pi.mount: Deactivated successfully. May 17 00:43:31.573908 kubelet[2103]: E0517 00:43:31.573854 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:32.574157 kubelet[2103]: E0517 00:43:32.574103 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:33.574614 kubelet[2103]: E0517 00:43:33.574574 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:34.575418 kubelet[2103]: E0517 00:43:34.575358 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:35.575784 kubelet[2103]: E0517 00:43:35.575729 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:36.576246 kubelet[2103]: E0517 00:43:36.576203 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:37.576612 kubelet[2103]: E0517 00:43:37.576559 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:38.577262 kubelet[2103]: E0517 00:43:38.577219 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:39.001674 kubelet[2103]: E0517 00:43:39.001539 2103 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.31.18?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="3.2s" May 17 00:43:39.577441 kubelet[2103]: E0517 00:43:39.577367 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:40.578016 kubelet[2103]: E0517 00:43:40.577972 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:41.578485 kubelet[2103]: E0517 00:43:41.578413 2103 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"