May 17 00:35:45.990021 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:35:45.990053 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:45.990072 kernel: BIOS-provided physical RAM map: May 17 00:35:45.990084 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:35:45.990095 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable May 17 00:35:45.990106 kernel: BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 17 00:35:45.990119 kernel: BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 17 00:35:45.990131 kernel: BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 17 00:35:45.990145 kernel: BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable May 17 00:35:45.990157 kernel: BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 17 00:35:45.990168 kernel: NX (Execute Disable) protection: active May 17 00:35:45.990231 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 17 00:35:45.990244 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 17 00:35:45.990256 kernel: extended physical RAM map: May 17 00:35:45.990274 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:35:45.990287 kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable May 17 00:35:45.990299 kernel: reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable May 17 00:35:45.990311 kernel: reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable May 17 00:35:45.990324 kernel: reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 17 00:35:45.990337 kernel: reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 17 00:35:45.990349 kernel: reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 17 00:35:45.990362 kernel: reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable May 17 00:35:45.990375 kernel: reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 17 00:35:45.990387 kernel: efi: EFI v2.70 by EDK II May 17 00:35:45.990402 kernel: efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77004a98 May 17 00:35:45.990414 kernel: SMBIOS 2.7 present. May 17 00:35:45.990427 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 May 17 00:35:45.990440 kernel: Hypervisor detected: KVM May 17 00:35:45.990452 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:35:45.990465 kernel: kvm-clock: cpu 0, msr 3019a001, primary cpu clock May 17 00:35:45.990477 kernel: kvm-clock: using sched offset of 4332865438 cycles May 17 00:35:45.990491 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:35:45.990504 kernel: tsc: Detected 2499.994 MHz processor May 17 00:35:45.990517 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:35:45.990530 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:35:45.990545 kernel: last_pfn = 0x7c97c max_arch_pfn = 0x400000000 May 17 00:35:45.990559 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:35:45.990571 kernel: Using GB pages for direct mapping May 17 00:35:45.990584 kernel: Secure boot disabled May 17 00:35:45.990597 kernel: ACPI: Early table checksum verification disabled May 17 00:35:45.990616 kernel: ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) May 17 00:35:45.990630 kernel: ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) May 17 00:35:45.990646 kernel: ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) May 17 00:35:45.990660 kernel: ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) May 17 00:35:45.990673 kernel: ACPI: FACS 0x00000000789D0000 000040 May 17 00:35:45.990688 kernel: ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) May 17 00:35:45.990702 kernel: ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) May 17 00:35:45.990716 kernel: ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) May 17 00:35:45.990730 kernel: ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) May 17 00:35:45.990746 kernel: ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) May 17 00:35:45.990761 kernel: ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 17 00:35:45.990775 kernel: ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 17 00:35:45.990788 kernel: ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) May 17 00:35:45.990803 kernel: ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] May 17 00:35:45.990816 kernel: ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] May 17 00:35:45.990830 kernel: ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] May 17 00:35:45.990844 kernel: ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] May 17 00:35:45.990858 kernel: ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] May 17 00:35:45.990875 kernel: ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] May 17 00:35:45.990889 kernel: ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] May 17 00:35:45.990902 kernel: ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] May 17 00:35:45.990916 kernel: ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] May 17 00:35:45.990930 kernel: ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] May 17 00:35:45.990944 kernel: ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] May 17 00:35:45.990958 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:35:45.990971 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:35:45.990985 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] May 17 00:35:45.991002 kernel: NUMA: Initialized distance table, cnt=1 May 17 00:35:45.991015 kernel: NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] May 17 00:35:45.991029 kernel: Zone ranges: May 17 00:35:45.991043 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:35:45.991057 kernel: DMA32 [mem 0x0000000001000000-0x000000007c97bfff] May 17 00:35:45.991071 kernel: Normal empty May 17 00:35:45.991084 kernel: Movable zone start for each node May 17 00:35:45.991098 kernel: Early memory node ranges May 17 00:35:45.991112 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 17 00:35:45.991129 kernel: node 0: [mem 0x0000000000100000-0x00000000786cdfff] May 17 00:35:45.991143 kernel: node 0: [mem 0x00000000789de000-0x000000007c97bfff] May 17 00:35:45.991157 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] May 17 00:35:45.995715 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:35:45.995755 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 17 00:35:45.995771 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 17 00:35:45.995787 kernel: On node 0, zone DMA32: 13956 pages in unavailable ranges May 17 00:35:45.995801 kernel: ACPI: PM-Timer IO Port: 0xb008 May 17 00:35:45.995815 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:35:45.995835 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 May 17 00:35:45.995850 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:35:45.995865 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:35:45.995879 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:35:45.995893 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:35:45.995907 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:35:45.995921 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 17 00:35:45.995934 kernel: TSC deadline timer available May 17 00:35:45.995948 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:35:45.995966 kernel: [mem 0x7ca00000-0xffffffff] available for PCI devices May 17 00:35:45.995981 kernel: Booting paravirtualized kernel on KVM May 17 00:35:45.995995 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:35:45.996009 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:35:45.996024 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:35:45.996038 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:35:45.996052 kernel: pcpu-alloc: [0] 0 1 May 17 00:35:45.996066 kernel: kvm-guest: stealtime: cpu 0, msr 7a41c0c0 May 17 00:35:45.996081 kernel: kvm-guest: PV spinlocks enabled May 17 00:35:45.996099 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:35:45.996113 kernel: Built 1 zonelists, mobility grouping on. Total pages: 501318 May 17 00:35:45.996127 kernel: Policy zone: DMA32 May 17 00:35:45.996144 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:45.996160 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:35:45.996188 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:35:45.996212 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:35:45.996227 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:35:45.996245 kernel: Memory: 1876640K/2037804K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 160904K reserved, 0K cma-reserved) May 17 00:35:45.996260 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:35:45.996275 kernel: Kernel/User page tables isolation: enabled May 17 00:35:45.996289 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:35:45.996303 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:35:45.996317 kernel: rcu: Hierarchical RCU implementation. May 17 00:35:45.996333 kernel: rcu: RCU event tracing is enabled. May 17 00:35:45.996363 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:35:45.996378 kernel: Rude variant of Tasks RCU enabled. May 17 00:35:45.996394 kernel: Tracing variant of Tasks RCU enabled. May 17 00:35:45.996410 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:35:45.996424 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:35:45.996443 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 17 00:35:45.996458 kernel: random: crng init done May 17 00:35:45.996471 kernel: Console: colour dummy device 80x25 May 17 00:35:45.996486 kernel: printk: console [tty0] enabled May 17 00:35:45.996500 kernel: printk: console [ttyS0] enabled May 17 00:35:45.996514 kernel: ACPI: Core revision 20210730 May 17 00:35:45.996529 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns May 17 00:35:45.996547 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:35:45.996562 kernel: x2apic enabled May 17 00:35:45.996574 kernel: Switched APIC routing to physical x2apic. May 17 00:35:45.996587 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns May 17 00:35:45.996601 kernel: Calibrating delay loop (skipped) preset value.. 4999.98 BogoMIPS (lpj=2499994) May 17 00:35:45.996615 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 00:35:45.996627 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 00:35:45.996644 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:35:45.996657 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:35:45.996670 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:35:45.996683 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 17 00:35:45.996697 kernel: RETBleed: Vulnerable May 17 00:35:45.996710 kernel: Speculative Store Bypass: Vulnerable May 17 00:35:45.996725 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:35:45.996739 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:35:45.996753 kernel: GDS: Unknown: Dependent on hypervisor status May 17 00:35:45.996768 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:35:45.996783 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:35:45.996801 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:35:45.996817 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' May 17 00:35:45.996833 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' May 17 00:35:45.996848 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 17 00:35:45.996863 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 17 00:35:45.996879 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 17 00:35:45.996894 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' May 17 00:35:45.996909 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:35:45.996924 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 May 17 00:35:45.996939 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 May 17 00:35:45.996954 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 May 17 00:35:45.996973 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 May 17 00:35:45.996989 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 May 17 00:35:45.997004 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 May 17 00:35:45.997019 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. May 17 00:35:45.997035 kernel: Freeing SMP alternatives memory: 32K May 17 00:35:45.997050 kernel: pid_max: default: 32768 minimum: 301 May 17 00:35:45.997065 kernel: LSM: Security Framework initializing May 17 00:35:45.997079 kernel: SELinux: Initializing. May 17 00:35:45.997093 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:35:45.997106 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:35:45.997119 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) May 17 00:35:45.997135 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 17 00:35:45.997148 kernel: signal: max sigframe size: 3632 May 17 00:35:45.997161 kernel: rcu: Hierarchical SRCU implementation. May 17 00:35:45.997189 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:35:45.997204 kernel: smp: Bringing up secondary CPUs ... May 17 00:35:45.997219 kernel: x86: Booting SMP configuration: May 17 00:35:45.997234 kernel: .... node #0, CPUs: #1 May 17 00:35:45.997247 kernel: kvm-clock: cpu 1, msr 3019a041, secondary cpu clock May 17 00:35:45.997260 kernel: kvm-guest: stealtime: cpu 1, msr 7a51c0c0 May 17 00:35:45.997278 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 17 00:35:45.997293 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 00:35:45.997306 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:35:45.997320 kernel: smpboot: Max logical packages: 1 May 17 00:35:45.997333 kernel: smpboot: Total of 2 processors activated (9999.97 BogoMIPS) May 17 00:35:45.997347 kernel: devtmpfs: initialized May 17 00:35:45.997360 kernel: x86/mm: Memory block size: 128MB May 17 00:35:45.997375 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) May 17 00:35:45.997389 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:35:45.997405 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:35:45.997419 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:35:45.997432 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:35:45.997446 kernel: audit: initializing netlink subsys (disabled) May 17 00:35:45.997460 kernel: audit: type=2000 audit(1747442145.918:1): state=initialized audit_enabled=0 res=1 May 17 00:35:45.997473 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:35:45.997487 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:35:45.997500 kernel: cpuidle: using governor menu May 17 00:35:45.997515 kernel: ACPI: bus type PCI registered May 17 00:35:45.997532 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:35:45.997545 kernel: dca service started, version 1.12.1 May 17 00:35:45.997558 kernel: PCI: Using configuration type 1 for base access May 17 00:35:45.997572 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:35:45.997586 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:35:45.997600 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:35:45.997613 kernel: ACPI: Added _OSI(Module Device) May 17 00:35:45.997626 kernel: ACPI: Added _OSI(Processor Device) May 17 00:35:45.997641 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:35:45.997658 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:35:45.997672 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:35:45.997686 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:35:45.997700 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:35:45.997715 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 17 00:35:45.997742 kernel: ACPI: Interpreter enabled May 17 00:35:45.997756 kernel: ACPI: PM: (supports S0 S5) May 17 00:35:45.997770 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:35:45.997785 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:35:45.997802 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 17 00:35:45.997816 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:35:45.998044 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 17 00:35:46.003226 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 17 00:35:46.003274 kernel: acpiphp: Slot [3] registered May 17 00:35:46.003291 kernel: acpiphp: Slot [4] registered May 17 00:35:46.003306 kernel: acpiphp: Slot [5] registered May 17 00:35:46.003331 kernel: acpiphp: Slot [6] registered May 17 00:35:46.003347 kernel: acpiphp: Slot [7] registered May 17 00:35:46.003361 kernel: acpiphp: Slot [8] registered May 17 00:35:46.003376 kernel: acpiphp: Slot [9] registered May 17 00:35:46.003396 kernel: acpiphp: Slot [10] registered May 17 00:35:46.003411 kernel: acpiphp: Slot [11] registered May 17 00:35:46.003425 kernel: acpiphp: Slot [12] registered May 17 00:35:46.003440 kernel: acpiphp: Slot [13] registered May 17 00:35:46.003454 kernel: acpiphp: Slot [14] registered May 17 00:35:46.003474 kernel: acpiphp: Slot [15] registered May 17 00:35:46.003491 kernel: acpiphp: Slot [16] registered May 17 00:35:46.003506 kernel: acpiphp: Slot [17] registered May 17 00:35:46.003522 kernel: acpiphp: Slot [18] registered May 17 00:35:46.003540 kernel: acpiphp: Slot [19] registered May 17 00:35:46.003554 kernel: acpiphp: Slot [20] registered May 17 00:35:46.003569 kernel: acpiphp: Slot [21] registered May 17 00:35:46.003589 kernel: acpiphp: Slot [22] registered May 17 00:35:46.003604 kernel: acpiphp: Slot [23] registered May 17 00:35:46.003618 kernel: acpiphp: Slot [24] registered May 17 00:35:46.003641 kernel: acpiphp: Slot [25] registered May 17 00:35:46.003655 kernel: acpiphp: Slot [26] registered May 17 00:35:46.003669 kernel: acpiphp: Slot [27] registered May 17 00:35:46.003689 kernel: acpiphp: Slot [28] registered May 17 00:35:46.003704 kernel: acpiphp: Slot [29] registered May 17 00:35:46.003718 kernel: acpiphp: Slot [30] registered May 17 00:35:46.003733 kernel: acpiphp: Slot [31] registered May 17 00:35:46.003748 kernel: PCI host bridge to bus 0000:00 May 17 00:35:46.003918 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:35:46.004038 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:35:46.004149 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:35:46.008351 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 17 00:35:46.008501 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] May 17 00:35:46.008624 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:35:46.008762 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 17 00:35:46.008896 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 17 00:35:46.009029 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 May 17 00:35:46.015902 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 17 00:35:46.016062 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff May 17 00:35:46.018394 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff May 17 00:35:46.018599 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff May 17 00:35:46.018727 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff May 17 00:35:46.018856 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff May 17 00:35:46.018996 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff May 17 00:35:46.019151 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 May 17 00:35:46.019311 kernel: pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] May 17 00:35:46.019440 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 17 00:35:46.019556 kernel: pci 0000:00:03.0: BAR 0: assigned to efifb May 17 00:35:46.019675 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:35:46.019811 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 May 17 00:35:46.019934 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] May 17 00:35:46.020074 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 May 17 00:35:46.021277 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] May 17 00:35:46.021309 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:35:46.021325 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:35:46.021340 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:35:46.021361 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:35:46.021375 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 17 00:35:46.021390 kernel: iommu: Default domain type: Translated May 17 00:35:46.021405 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:35:46.021543 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device May 17 00:35:46.021665 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:35:46.021800 kernel: pci 0000:00:03.0: vgaarb: bridge control possible May 17 00:35:46.021819 kernel: vgaarb: loaded May 17 00:35:46.021834 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:35:46.021853 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:35:46.021867 kernel: PTP clock support registered May 17 00:35:46.021883 kernel: Registered efivars operations May 17 00:35:46.021897 kernel: PCI: Using ACPI for IRQ routing May 17 00:35:46.021912 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:35:46.021926 kernel: e820: reserve RAM buffer [mem 0x76813018-0x77ffffff] May 17 00:35:46.021941 kernel: e820: reserve RAM buffer [mem 0x786ce000-0x7bffffff] May 17 00:35:46.021955 kernel: e820: reserve RAM buffer [mem 0x7c97c000-0x7fffffff] May 17 00:35:46.021970 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 May 17 00:35:46.021987 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter May 17 00:35:46.022001 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:35:46.022016 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:35:46.022031 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:35:46.022046 kernel: pnp: PnP ACPI init May 17 00:35:46.022061 kernel: pnp: PnP ACPI: found 5 devices May 17 00:35:46.022075 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:35:46.022090 kernel: NET: Registered PF_INET protocol family May 17 00:35:46.022105 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:35:46.022122 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 17 00:35:46.022137 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:35:46.022152 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:35:46.022166 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 17 00:35:46.030314 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 17 00:35:46.030335 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:35:46.030352 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:35:46.030366 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:35:46.030388 kernel: NET: Registered PF_XDP protocol family May 17 00:35:46.030558 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:35:46.030675 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:35:46.030793 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:35:46.030911 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 17 00:35:46.031027 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] May 17 00:35:46.031162 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:35:46.031370 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 17 00:35:46.031394 kernel: PCI: CLS 0 bytes, default 64 May 17 00:35:46.031410 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:35:46.031425 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns May 17 00:35:46.031440 kernel: clocksource: Switched to clocksource tsc May 17 00:35:46.031456 kernel: Initialise system trusted keyrings May 17 00:35:46.031471 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 17 00:35:46.031486 kernel: Key type asymmetric registered May 17 00:35:46.031500 kernel: Asymmetric key parser 'x509' registered May 17 00:35:46.031515 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:35:46.031533 kernel: io scheduler mq-deadline registered May 17 00:35:46.031547 kernel: io scheduler kyber registered May 17 00:35:46.031562 kernel: io scheduler bfq registered May 17 00:35:46.031575 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:35:46.031590 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:35:46.031604 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:35:46.031618 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:35:46.031632 kernel: i8042: Warning: Keylock active May 17 00:35:46.031646 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:35:46.031664 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:35:46.031793 kernel: rtc_cmos 00:00: RTC can wake from S4 May 17 00:35:46.031909 kernel: rtc_cmos 00:00: registered as rtc0 May 17 00:35:46.032021 kernel: rtc_cmos 00:00: setting system clock to 2025-05-17T00:35:45 UTC (1747442145) May 17 00:35:46.032135 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 17 00:35:46.032153 kernel: intel_pstate: CPU model not supported May 17 00:35:46.032169 kernel: efifb: probing for efifb May 17 00:35:46.033278 kernel: efifb: framebuffer at 0x80000000, using 1876k, total 1875k May 17 00:35:46.033307 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 May 17 00:35:46.033322 kernel: efifb: scrolling: redraw May 17 00:35:46.033338 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:35:46.033353 kernel: Console: switching to colour frame buffer device 100x37 May 17 00:35:46.033368 kernel: fb0: EFI VGA frame buffer device May 17 00:35:46.033384 kernel: pstore: Registered efi as persistent store backend May 17 00:35:46.033422 kernel: NET: Registered PF_INET6 protocol family May 17 00:35:46.033441 kernel: Segment Routing with IPv6 May 17 00:35:46.033456 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:35:46.033475 kernel: NET: Registered PF_PACKET protocol family May 17 00:35:46.033490 kernel: Key type dns_resolver registered May 17 00:35:46.033506 kernel: IPI shorthand broadcast: enabled May 17 00:35:46.033522 kernel: sched_clock: Marking stable (356393863, 132418696)->(570960986, -82148427) May 17 00:35:46.033538 kernel: registered taskstats version 1 May 17 00:35:46.033554 kernel: Loading compiled-in X.509 certificates May 17 00:35:46.033572 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:35:46.033587 kernel: Key type .fscrypt registered May 17 00:35:46.033603 kernel: Key type fscrypt-provisioning registered May 17 00:35:46.033621 kernel: pstore: Using crash dump compression: deflate May 17 00:35:46.033637 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:35:46.033651 kernel: ima: Allocated hash algorithm: sha1 May 17 00:35:46.033667 kernel: ima: No architecture policies found May 17 00:35:46.033683 kernel: clk: Disabling unused clocks May 17 00:35:46.033699 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:35:46.033713 kernel: Write protecting the kernel read-only data: 28672k May 17 00:35:46.033737 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:35:46.033752 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:35:46.033771 kernel: Run /init as init process May 17 00:35:46.033786 kernel: with arguments: May 17 00:35:46.033802 kernel: /init May 17 00:35:46.033817 kernel: with environment: May 17 00:35:46.033832 kernel: HOME=/ May 17 00:35:46.033847 kernel: TERM=linux May 17 00:35:46.033863 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:35:46.033883 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:35:46.033906 systemd[1]: Detected virtualization amazon. May 17 00:35:46.033922 systemd[1]: Detected architecture x86-64. May 17 00:35:46.033938 systemd[1]: Running in initrd. May 17 00:35:46.033954 systemd[1]: No hostname configured, using default hostname. May 17 00:35:46.033970 systemd[1]: Hostname set to . May 17 00:35:46.033987 systemd[1]: Initializing machine ID from VM UUID. May 17 00:35:46.034003 systemd[1]: Queued start job for default target initrd.target. May 17 00:35:46.034022 systemd[1]: Started systemd-ask-password-console.path. May 17 00:35:46.034041 systemd[1]: Reached target cryptsetup.target. May 17 00:35:46.034057 systemd[1]: Reached target paths.target. May 17 00:35:46.034072 systemd[1]: Reached target slices.target. May 17 00:35:46.034088 systemd[1]: Reached target swap.target. May 17 00:35:46.034104 systemd[1]: Reached target timers.target. May 17 00:35:46.034124 systemd[1]: Listening on iscsid.socket. May 17 00:35:46.034141 systemd[1]: Listening on iscsiuio.socket. May 17 00:35:46.034155 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:35:46.034184 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:35:46.034277 systemd[1]: Listening on systemd-journald.socket. May 17 00:35:46.034292 systemd[1]: Listening on systemd-networkd.socket. May 17 00:35:46.034308 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:35:46.034324 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:35:46.034340 systemd[1]: Reached target sockets.target. May 17 00:35:46.034356 systemd[1]: Starting kmod-static-nodes.service... May 17 00:35:46.034371 systemd[1]: Finished network-cleanup.service. May 17 00:35:46.034387 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:35:46.034402 systemd[1]: Starting systemd-journald.service... May 17 00:35:46.034417 systemd[1]: Starting systemd-modules-load.service... May 17 00:35:46.034431 systemd[1]: Starting systemd-resolved.service... May 17 00:35:46.034448 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:35:46.034467 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:35:46.034485 systemd[1]: Finished kmod-static-nodes.service. May 17 00:35:46.034499 kernel: audit: type=1130 audit(1747442146.009:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.034514 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:35:46.034528 kernel: audit: type=1130 audit(1747442146.022:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.034541 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:35:46.034560 systemd-journald[185]: Journal started May 17 00:35:46.034648 systemd-journald[185]: Runtime Journal (/run/log/journal/ec210fc15f6e9cb9f3141c58f19e89f3) is 4.8M, max 38.3M, 33.5M free. May 17 00:35:46.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.030628 systemd-resolved[187]: Positive Trust Anchors: May 17 00:35:46.053068 kernel: audit: type=1130 audit(1747442146.035:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.053106 systemd[1]: Started systemd-journald.service. May 17 00:35:46.053126 kernel: audit: type=1130 audit(1747442146.045:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.053146 kernel: audit: type=1130 audit(1747442146.046:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.030646 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:35:46.030704 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:35:46.034489 systemd-modules-load[186]: Inserted module 'overlay' May 17 00:35:46.043045 systemd-resolved[187]: Defaulting to hostname 'linux'. May 17 00:35:46.045372 systemd[1]: Started systemd-resolved.service. May 17 00:35:46.046541 systemd[1]: Reached target nss-lookup.target. May 17 00:35:46.069657 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:35:46.078933 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:35:46.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.092406 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:35:46.100933 kernel: audit: type=1130 audit(1747442146.093:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.107196 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:35:46.108233 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:35:46.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.117306 kernel: audit: type=1130 audit(1747442146.109:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.117866 systemd[1]: Starting dracut-cmdline.service... May 17 00:35:46.124213 kernel: Bridge firewalling registered May 17 00:35:46.122448 systemd-modules-load[186]: Inserted module 'br_netfilter' May 17 00:35:46.131636 dracut-cmdline[201]: dracut-dracut-053 May 17 00:35:46.136080 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:46.153198 kernel: SCSI subsystem initialized May 17 00:35:46.174236 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:35:46.174302 kernel: device-mapper: uevent: version 1.0.3 May 17 00:35:46.174322 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:35:46.181491 systemd-modules-load[186]: Inserted module 'dm_multipath' May 17 00:35:46.182955 systemd[1]: Finished systemd-modules-load.service. May 17 00:35:46.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.186738 systemd[1]: Starting systemd-sysctl.service... May 17 00:35:46.196169 kernel: audit: type=1130 audit(1747442146.185:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.198518 systemd[1]: Finished systemd-sysctl.service. May 17 00:35:46.206527 kernel: audit: type=1130 audit(1747442146.199:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.232206 kernel: Loading iSCSI transport class v2.0-870. May 17 00:35:46.251202 kernel: iscsi: registered transport (tcp) May 17 00:35:46.276906 kernel: iscsi: registered transport (qla4xxx) May 17 00:35:46.276992 kernel: QLogic iSCSI HBA Driver May 17 00:35:46.309115 systemd[1]: Finished dracut-cmdline.service. May 17 00:35:46.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.311117 systemd[1]: Starting dracut-pre-udev.service... May 17 00:35:46.363233 kernel: raid6: avx512x4 gen() 17069 MB/s May 17 00:35:46.381244 kernel: raid6: avx512x4 xor() 8151 MB/s May 17 00:35:46.399234 kernel: raid6: avx512x2 gen() 16524 MB/s May 17 00:35:46.417238 kernel: raid6: avx512x2 xor() 24057 MB/s May 17 00:35:46.435236 kernel: raid6: avx512x1 gen() 16681 MB/s May 17 00:35:46.453227 kernel: raid6: avx512x1 xor() 21941 MB/s May 17 00:35:46.471213 kernel: raid6: avx2x4 gen() 16530 MB/s May 17 00:35:46.489202 kernel: raid6: avx2x4 xor() 7443 MB/s May 17 00:35:46.507222 kernel: raid6: avx2x2 gen() 16123 MB/s May 17 00:35:46.525210 kernel: raid6: avx2x2 xor() 18216 MB/s May 17 00:35:46.543202 kernel: raid6: avx2x1 gen() 11603 MB/s May 17 00:35:46.561220 kernel: raid6: avx2x1 xor() 15859 MB/s May 17 00:35:46.579224 kernel: raid6: sse2x4 gen() 9555 MB/s May 17 00:35:46.597212 kernel: raid6: sse2x4 xor() 6148 MB/s May 17 00:35:46.615213 kernel: raid6: sse2x2 gen() 10589 MB/s May 17 00:35:46.633208 kernel: raid6: sse2x2 xor() 6316 MB/s May 17 00:35:46.651207 kernel: raid6: sse2x1 gen() 9506 MB/s May 17 00:35:46.669392 kernel: raid6: sse2x1 xor() 4885 MB/s May 17 00:35:46.669434 kernel: raid6: using algorithm avx512x4 gen() 17069 MB/s May 17 00:35:46.669465 kernel: raid6: .... xor() 8151 MB/s, rmw enabled May 17 00:35:46.670487 kernel: raid6: using avx512x2 recovery algorithm May 17 00:35:46.685202 kernel: xor: automatically using best checksumming function avx May 17 00:35:46.789205 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:35:46.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.798000 audit: BPF prog-id=7 op=LOAD May 17 00:35:46.798000 audit: BPF prog-id=8 op=LOAD May 17 00:35:46.797585 systemd[1]: Finished dracut-pre-udev.service. May 17 00:35:46.798970 systemd[1]: Starting systemd-udevd.service... May 17 00:35:46.812445 systemd-udevd[384]: Using default interface naming scheme 'v252'. May 17 00:35:46.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.817674 systemd[1]: Started systemd-udevd.service. May 17 00:35:46.819450 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:35:46.839640 dracut-pre-trigger[389]: rd.md=0: removing MD RAID activation May 17 00:35:46.870978 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:35:46.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.872541 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:35:46.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:46.914699 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:35:46.972197 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:35:46.996263 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:35:46.996333 kernel: AES CTR mode by8 optimization enabled May 17 00:35:47.016954 kernel: ena 0000:00:05.0: ENA device version: 0.10 May 17 00:35:47.037573 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 May 17 00:35:47.037752 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. May 17 00:35:47.037891 kernel: nvme nvme0: pci function 0000:00:04.0 May 17 00:35:47.038046 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:fd:fa:1d:29:f5 May 17 00:35:47.038197 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 17 00:35:47.049209 kernel: nvme nvme0: 2/0/0 default/read/poll queues May 17 00:35:47.058447 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:35:47.058514 kernel: GPT:9289727 != 16777215 May 17 00:35:47.058527 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:35:47.058539 kernel: GPT:9289727 != 16777215 May 17 00:35:47.058549 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:35:47.059622 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:35:47.063031 (udev-worker)[429]: Network interface NamePolicy= disabled on kernel command line. May 17 00:35:47.135204 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (435) May 17 00:35:47.150222 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:35:47.214220 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:35:47.214874 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:35:47.221209 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:35:47.226882 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:35:47.228655 systemd[1]: Starting disk-uuid.service... May 17 00:35:47.236013 disk-uuid[592]: Primary Header is updated. May 17 00:35:47.236013 disk-uuid[592]: Secondary Entries is updated. May 17 00:35:47.236013 disk-uuid[592]: Secondary Header is updated. May 17 00:35:47.243210 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:35:47.250398 kernel: GPT:disk_guids don't match. May 17 00:35:47.250475 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:35:47.250496 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:35:47.260313 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:35:48.260797 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:35:48.260853 disk-uuid[593]: The operation has completed successfully. May 17 00:35:48.363028 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:35:48.363132 systemd[1]: Finished disk-uuid.service. May 17 00:35:48.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:48.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:48.369382 systemd[1]: Starting verity-setup.service... May 17 00:35:48.387198 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:35:48.478787 systemd[1]: Found device dev-mapper-usr.device. May 17 00:35:48.481093 systemd[1]: Finished verity-setup.service. May 17 00:35:48.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:48.483053 systemd[1]: Mounting sysusr-usr.mount... May 17 00:35:48.580195 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:35:48.580345 systemd[1]: Mounted sysusr-usr.mount. May 17 00:35:48.581127 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:35:48.582031 systemd[1]: Starting ignition-setup.service... May 17 00:35:48.584630 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:35:48.609817 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:48.609904 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:35:48.609926 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:35:48.629211 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:35:48.643830 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:35:48.656481 systemd[1]: Finished ignition-setup.service. May 17 00:35:48.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:48.658640 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:35:48.673300 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:35:48.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:48.675000 audit: BPF prog-id=9 op=LOAD May 17 00:35:48.676093 systemd[1]: Starting systemd-networkd.service... May 17 00:35:48.699733 systemd-networkd[1105]: lo: Link UP May 17 00:35:48.699746 systemd-networkd[1105]: lo: Gained carrier May 17 00:35:48.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:48.700834 systemd-networkd[1105]: Enumeration completed May 17 00:35:48.700955 systemd[1]: Started systemd-networkd.service. May 17 00:35:48.701313 systemd-networkd[1105]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:35:48.702043 systemd[1]: Reached target network.target. May 17 00:35:48.703908 systemd[1]: Starting iscsiuio.service... May 17 00:35:48.712001 systemd[1]: Started iscsiuio.service. May 17 00:35:48.713307 systemd-networkd[1105]: eth0: Link UP May 17 00:35:48.713314 systemd-networkd[1105]: eth0: Gained carrier May 17 00:35:48.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:48.716013 systemd[1]: Starting iscsid.service... May 17 00:35:48.719940 iscsid[1110]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:35:48.719940 iscsid[1110]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:35:48.719940 iscsid[1110]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:35:48.719940 iscsid[1110]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:35:48.719940 iscsid[1110]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:35:48.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:48.734467 iscsid[1110]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:35:48.723307 systemd[1]: Started iscsid.service. May 17 00:35:48.727945 systemd[1]: Starting dracut-initqueue.service... May 17 00:35:48.733374 systemd-networkd[1105]: eth0: DHCPv4 address 172.31.24.63/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 17 00:35:48.744703 systemd[1]: Finished dracut-initqueue.service. May 17 00:35:48.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:48.745507 systemd[1]: Reached target remote-fs-pre.target. May 17 00:35:48.746836 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:35:48.748051 systemd[1]: Reached target remote-fs.target. May 17 00:35:48.750478 systemd[1]: Starting dracut-pre-mount.service... May 17 00:35:48.760099 systemd[1]: Finished dracut-pre-mount.service. May 17 00:35:48.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:49.228295 ignition[1093]: Ignition 2.14.0 May 17 00:35:49.228308 ignition[1093]: Stage: fetch-offline May 17 00:35:49.228428 ignition[1093]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:49.228459 ignition[1093]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:35:49.247730 ignition[1093]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:35:49.248093 ignition[1093]: Ignition finished successfully May 17 00:35:49.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:49.250312 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:35:49.251875 systemd[1]: Starting ignition-fetch.service... May 17 00:35:49.260036 ignition[1129]: Ignition 2.14.0 May 17 00:35:49.260048 ignition[1129]: Stage: fetch May 17 00:35:49.260207 ignition[1129]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:49.260230 ignition[1129]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:35:49.266474 ignition[1129]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:35:49.267160 ignition[1129]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:35:49.275548 ignition[1129]: INFO : PUT result: OK May 17 00:35:49.277263 ignition[1129]: DEBUG : parsed url from cmdline: "" May 17 00:35:49.277263 ignition[1129]: INFO : no config URL provided May 17 00:35:49.277263 ignition[1129]: INFO : reading system config file "/usr/lib/ignition/user.ign" May 17 00:35:49.277263 ignition[1129]: INFO : no config at "/usr/lib/ignition/user.ign" May 17 00:35:49.280925 ignition[1129]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:35:49.280925 ignition[1129]: INFO : PUT result: OK May 17 00:35:49.280925 ignition[1129]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 May 17 00:35:49.280925 ignition[1129]: INFO : GET result: OK May 17 00:35:49.280925 ignition[1129]: DEBUG : parsing config with SHA512: dd65d6dc9b77011aaf2606696588832f389a2a0ebd4a667abe2e8d1fa51802237aeaa32eb1db28072ac83c8bded6c916caf19a836bef31c4c4b4387b6cfd8b5e May 17 00:35:49.283368 ignition[1129]: fetch: fetch complete May 17 00:35:49.282397 unknown[1129]: fetched base config from "system" May 17 00:35:49.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:49.283383 ignition[1129]: fetch: fetch passed May 17 00:35:49.282407 unknown[1129]: fetched base config from "system" May 17 00:35:49.283457 ignition[1129]: Ignition finished successfully May 17 00:35:49.282416 unknown[1129]: fetched user config from "aws" May 17 00:35:49.285673 systemd[1]: Finished ignition-fetch.service. May 17 00:35:49.288372 systemd[1]: Starting ignition-kargs.service... May 17 00:35:49.300046 ignition[1135]: Ignition 2.14.0 May 17 00:35:49.300058 ignition[1135]: Stage: kargs May 17 00:35:49.300298 ignition[1135]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:49.300333 ignition[1135]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:35:49.307798 ignition[1135]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:35:49.308636 ignition[1135]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:35:49.309344 ignition[1135]: INFO : PUT result: OK May 17 00:35:49.310916 ignition[1135]: kargs: kargs passed May 17 00:35:49.310979 ignition[1135]: Ignition finished successfully May 17 00:35:49.312354 systemd[1]: Finished ignition-kargs.service. May 17 00:35:49.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:49.314253 systemd[1]: Starting ignition-disks.service... May 17 00:35:49.322880 ignition[1141]: Ignition 2.14.0 May 17 00:35:49.322893 ignition[1141]: Stage: disks May 17 00:35:49.323087 ignition[1141]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:49.323120 ignition[1141]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:35:49.330487 ignition[1141]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:35:49.331256 ignition[1141]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:35:49.331997 ignition[1141]: INFO : PUT result: OK May 17 00:35:49.333878 ignition[1141]: disks: disks passed May 17 00:35:49.333942 ignition[1141]: Ignition finished successfully May 17 00:35:49.335302 systemd[1]: Finished ignition-disks.service. May 17 00:35:49.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:49.336272 systemd[1]: Reached target initrd-root-device.target. May 17 00:35:49.337149 systemd[1]: Reached target local-fs-pre.target. May 17 00:35:49.338237 systemd[1]: Reached target local-fs.target. May 17 00:35:49.339130 systemd[1]: Reached target sysinit.target. May 17 00:35:49.340107 systemd[1]: Reached target basic.target. May 17 00:35:49.342263 systemd[1]: Starting systemd-fsck-root.service... May 17 00:35:49.374711 systemd-fsck[1149]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 17 00:35:49.377573 systemd[1]: Finished systemd-fsck-root.service. May 17 00:35:49.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:49.379146 systemd[1]: Mounting sysroot.mount... May 17 00:35:49.397203 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:35:49.398563 systemd[1]: Mounted sysroot.mount. May 17 00:35:49.399222 systemd[1]: Reached target initrd-root-fs.target. May 17 00:35:49.410015 systemd[1]: Mounting sysroot-usr.mount... May 17 00:35:49.411043 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:35:49.411087 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:35:49.411114 systemd[1]: Reached target ignition-diskful.target. May 17 00:35:49.413592 systemd[1]: Mounted sysroot-usr.mount. May 17 00:35:49.418741 systemd[1]: Starting initrd-setup-root.service... May 17 00:35:49.431915 initrd-setup-root[1170]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:35:49.463736 initrd-setup-root[1178]: cut: /sysroot/etc/group: No such file or directory May 17 00:35:49.468112 initrd-setup-root[1186]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:35:49.473115 initrd-setup-root[1194]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:35:49.512583 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:35:49.532215 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1202) May 17 00:35:49.536515 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:49.536570 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:35:49.536582 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:35:49.559201 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:35:49.569267 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:35:49.649494 systemd[1]: Finished initrd-setup-root.service. May 17 00:35:49.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:49.651432 systemd[1]: Starting ignition-mount.service... May 17 00:35:49.655495 systemd[1]: Starting sysroot-boot.service... May 17 00:35:49.662186 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:35:49.662339 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:35:49.677644 ignition[1231]: INFO : Ignition 2.14.0 May 17 00:35:49.678942 ignition[1231]: INFO : Stage: mount May 17 00:35:49.680219 ignition[1231]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:49.682113 ignition[1231]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:35:49.695379 ignition[1231]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:35:49.696976 ignition[1231]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:35:49.697930 ignition[1231]: INFO : PUT result: OK May 17 00:35:49.701469 ignition[1231]: INFO : mount: mount passed May 17 00:35:49.701526 systemd[1]: Finished sysroot-boot.service. May 17 00:35:49.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:49.703370 ignition[1231]: INFO : Ignition finished successfully May 17 00:35:49.703810 systemd[1]: Finished ignition-mount.service. May 17 00:35:49.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:49.705400 systemd[1]: Starting ignition-files.service... May 17 00:35:49.713310 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:35:49.731230 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1241) May 17 00:35:49.735144 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:49.735216 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:35:49.735229 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:35:49.773214 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:35:49.776574 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:35:49.788052 ignition[1260]: INFO : Ignition 2.14.0 May 17 00:35:49.788052 ignition[1260]: INFO : Stage: files May 17 00:35:49.790379 ignition[1260]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:49.790379 ignition[1260]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:35:49.797690 ignition[1260]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:35:49.798767 ignition[1260]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:35:49.799581 ignition[1260]: INFO : PUT result: OK May 17 00:35:49.802345 ignition[1260]: DEBUG : files: compiled without relabeling support, skipping May 17 00:35:49.807550 ignition[1260]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:35:49.807550 ignition[1260]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:35:49.831546 ignition[1260]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:35:49.832963 ignition[1260]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:35:49.834222 ignition[1260]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:35:49.834222 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" May 17 00:35:49.834222 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:49.833047 unknown[1260]: wrote ssh authorized keys file for user: core May 17 00:35:49.839385 ignition[1260]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem685686393" May 17 00:35:49.840641 ignition[1260]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem685686393": device or resource busy May 17 00:35:49.840641 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem685686393", trying btrfs: device or resource busy May 17 00:35:49.840641 ignition[1260]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem685686393" May 17 00:35:49.840641 ignition[1260]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem685686393" May 17 00:35:49.852955 ignition[1260]: INFO : op(3): [started] unmounting "/mnt/oem685686393" May 17 00:35:49.854148 ignition[1260]: INFO : op(3): [finished] unmounting "/mnt/oem685686393" May 17 00:35:49.854148 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" May 17 00:35:49.854148 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:35:49.854148 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:35:49.854148 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:35:49.854148 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:35:49.854148 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:35:49.871049 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:35:49.871049 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 17 00:35:49.871049 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:49.871049 ignition[1260]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1692485976" May 17 00:35:49.871049 ignition[1260]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1692485976": device or resource busy May 17 00:35:49.871049 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1692485976", trying btrfs: device or resource busy May 17 00:35:49.871049 ignition[1260]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1692485976" May 17 00:35:49.871049 ignition[1260]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1692485976" May 17 00:35:49.871049 ignition[1260]: INFO : op(6): [started] unmounting "/mnt/oem1692485976" May 17 00:35:49.871049 ignition[1260]: INFO : op(6): [finished] unmounting "/mnt/oem1692485976" May 17 00:35:49.871049 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 17 00:35:49.871049 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 17 00:35:49.871049 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:49.898640 ignition[1260]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3782966998" May 17 00:35:49.898640 ignition[1260]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3782966998": device or resource busy May 17 00:35:49.898640 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3782966998", trying btrfs: device or resource busy May 17 00:35:49.898640 ignition[1260]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3782966998" May 17 00:35:49.898640 ignition[1260]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3782966998" May 17 00:35:49.898640 ignition[1260]: INFO : op(9): [started] unmounting "/mnt/oem3782966998" May 17 00:35:49.898640 ignition[1260]: INFO : op(9): [finished] unmounting "/mnt/oem3782966998" May 17 00:35:49.898640 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 17 00:35:49.898640 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:35:49.898640 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:49.898640 ignition[1260]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem514440766" May 17 00:35:49.898640 ignition[1260]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem514440766": device or resource busy May 17 00:35:49.898640 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem514440766", trying btrfs: device or resource busy May 17 00:35:49.898640 ignition[1260]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem514440766" May 17 00:35:49.898640 ignition[1260]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem514440766" May 17 00:35:49.898640 ignition[1260]: INFO : op(c): [started] unmounting "/mnt/oem514440766" May 17 00:35:49.898640 ignition[1260]: INFO : op(c): [finished] unmounting "/mnt/oem514440766" May 17 00:35:49.898640 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:35:49.898640 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:35:49.898640 ignition[1260]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 May 17 00:35:50.486362 systemd-networkd[1105]: eth0: Gained IPv6LL May 17 00:35:50.622032 ignition[1260]: INFO : GET result: OK May 17 00:35:51.095842 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:35:51.095842 ignition[1260]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 17 00:35:51.095842 ignition[1260]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 17 00:35:51.103216 ignition[1260]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" May 17 00:35:51.103216 ignition[1260]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 17 00:35:51.103216 ignition[1260]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 17 00:35:51.103216 ignition[1260]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" May 17 00:35:51.103216 ignition[1260]: INFO : files: op(e): [started] processing unit "nvidia.service" May 17 00:35:51.103216 ignition[1260]: INFO : files: op(e): [finished] processing unit "nvidia.service" May 17 00:35:51.103216 ignition[1260]: INFO : files: op(f): [started] setting preset to enabled for "amazon-ssm-agent.service" May 17 00:35:51.103216 ignition[1260]: INFO : files: op(f): [finished] setting preset to enabled for "amazon-ssm-agent.service" May 17 00:35:51.103216 ignition[1260]: INFO : files: op(10): [started] setting preset to enabled for "nvidia.service" May 17 00:35:51.103216 ignition[1260]: INFO : files: op(10): [finished] setting preset to enabled for "nvidia.service" May 17 00:35:51.103216 ignition[1260]: INFO : files: op(11): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:35:51.103216 ignition[1260]: INFO : files: op(11): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:35:51.160673 kernel: kauditd_printk_skb: 26 callbacks suppressed May 17 00:35:51.160710 kernel: audit: type=1130 audit(1747442151.110:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.160733 kernel: audit: type=1130 audit(1747442151.132:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.160753 kernel: audit: type=1131 audit(1747442151.137:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.160774 kernel: audit: type=1130 audit(1747442151.149:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.161006 ignition[1260]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:35:51.161006 ignition[1260]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:35:51.161006 ignition[1260]: INFO : files: files passed May 17 00:35:51.161006 ignition[1260]: INFO : Ignition finished successfully May 17 00:35:51.108381 systemd[1]: Finished ignition-files.service. May 17 00:35:51.119616 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:35:51.170869 initrd-setup-root-after-ignition[1285]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:35:51.124813 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:35:51.126053 systemd[1]: Starting ignition-quench.service... May 17 00:35:51.131412 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:35:51.131508 systemd[1]: Finished ignition-quench.service. May 17 00:35:51.147281 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:35:51.149586 systemd[1]: Reached target ignition-complete.target. May 17 00:35:51.158532 systemd[1]: Starting initrd-parse-etc.service... May 17 00:35:51.193391 kernel: audit: type=1130 audit(1747442151.182:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.193437 kernel: audit: type=1131 audit(1747442151.182:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.181720 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:35:51.181859 systemd[1]: Finished initrd-parse-etc.service. May 17 00:35:51.182873 systemd[1]: Reached target initrd-fs.target. May 17 00:35:51.194271 systemd[1]: Reached target initrd.target. May 17 00:35:51.195808 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:35:51.197106 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:35:51.211364 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:35:51.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.213236 systemd[1]: Starting initrd-cleanup.service... May 17 00:35:51.220373 kernel: audit: type=1130 audit(1747442151.211:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.230306 systemd[1]: Stopped target nss-lookup.target. May 17 00:35:51.231231 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:35:51.232596 systemd[1]: Stopped target timers.target. May 17 00:35:51.233931 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:35:51.241299 kernel: audit: type=1131 audit(1747442151.235:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.234139 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:35:51.235460 systemd[1]: Stopped target initrd.target. May 17 00:35:51.242315 systemd[1]: Stopped target basic.target. May 17 00:35:51.243569 systemd[1]: Stopped target ignition-complete.target. May 17 00:35:51.244811 systemd[1]: Stopped target ignition-diskful.target. May 17 00:35:51.246127 systemd[1]: Stopped target initrd-root-device.target. May 17 00:35:51.247336 systemd[1]: Stopped target remote-fs.target. May 17 00:35:51.248513 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:35:51.249798 systemd[1]: Stopped target sysinit.target. May 17 00:35:51.251031 systemd[1]: Stopped target local-fs.target. May 17 00:35:51.252251 systemd[1]: Stopped target local-fs-pre.target. May 17 00:35:51.253475 systemd[1]: Stopped target swap.target. May 17 00:35:51.261087 kernel: audit: type=1131 audit(1747442151.255:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.254715 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:35:51.254917 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:35:51.268603 kernel: audit: type=1131 audit(1747442151.263:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.256134 systemd[1]: Stopped target cryptsetup.target. May 17 00:35:51.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.262012 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:35:51.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.262250 systemd[1]: Stopped dracut-initqueue.service. May 17 00:35:51.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.282931 iscsid[1110]: iscsid shutting down. May 17 00:35:51.263464 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:35:51.263680 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:35:51.289547 ignition[1298]: INFO : Ignition 2.14.0 May 17 00:35:51.289547 ignition[1298]: INFO : Stage: umount May 17 00:35:51.289547 ignition[1298]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:51.289547 ignition[1298]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:35:51.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.269490 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:35:51.294655 ignition[1298]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:35:51.294655 ignition[1298]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:35:51.294655 ignition[1298]: INFO : PUT result: OK May 17 00:35:51.269627 systemd[1]: Stopped ignition-files.service. May 17 00:35:51.299335 ignition[1298]: INFO : umount: umount passed May 17 00:35:51.299335 ignition[1298]: INFO : Ignition finished successfully May 17 00:35:51.271663 systemd[1]: Stopping ignition-mount.service... May 17 00:35:51.272608 systemd[1]: Stopping iscsid.service... May 17 00:35:51.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.273152 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:35:51.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.273282 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:35:51.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.278856 systemd[1]: Stopping sysroot-boot.service... May 17 00:35:51.279485 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:35:51.279643 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:35:51.280395 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:35:51.280492 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:35:51.282640 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:35:51.284235 systemd[1]: Stopped iscsid.service. May 17 00:35:51.295829 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:35:51.296587 systemd[1]: Finished initrd-cleanup.service. May 17 00:35:51.302696 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:35:51.302795 systemd[1]: Stopped ignition-mount.service. May 17 00:35:51.304220 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:35:51.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.304286 systemd[1]: Stopped ignition-disks.service. May 17 00:35:51.304838 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:35:51.304880 systemd[1]: Stopped ignition-kargs.service. May 17 00:35:51.305410 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:35:51.305444 systemd[1]: Stopped ignition-fetch.service. May 17 00:35:51.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.306016 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:35:51.306052 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:35:51.306866 systemd[1]: Stopped target paths.target. May 17 00:35:51.307775 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:35:51.311255 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:35:51.312052 systemd[1]: Stopped target slices.target. May 17 00:35:51.313062 systemd[1]: Stopped target sockets.target. May 17 00:35:51.314243 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:35:51.314292 systemd[1]: Closed iscsid.socket. May 17 00:35:51.315507 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:35:51.315582 systemd[1]: Stopped ignition-setup.service. May 17 00:35:51.318030 systemd[1]: Stopping iscsiuio.service... May 17 00:35:51.322568 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:35:51.323199 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:35:51.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.323331 systemd[1]: Stopped iscsiuio.service. May 17 00:35:51.324079 systemd[1]: Stopped target network.target. May 17 00:35:51.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.325056 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:35:51.325103 systemd[1]: Closed iscsiuio.socket. May 17 00:35:51.326501 systemd[1]: Stopping systemd-networkd.service... May 17 00:35:51.327633 systemd[1]: Stopping systemd-resolved.service... May 17 00:35:51.333317 systemd-networkd[1105]: eth0: DHCPv6 lease lost May 17 00:35:51.350000 audit: BPF prog-id=9 op=UNLOAD May 17 00:35:51.334685 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:35:51.334819 systemd[1]: Stopped systemd-networkd.service. May 17 00:35:51.336576 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:35:51.336619 systemd[1]: Closed systemd-networkd.socket. May 17 00:35:51.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.339590 systemd[1]: Stopping network-cleanup.service... May 17 00:35:51.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.340976 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:35:51.358000 audit: BPF prog-id=6 op=UNLOAD May 17 00:35:51.341049 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:35:51.341907 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:35:51.341950 systemd[1]: Stopped systemd-sysctl.service. May 17 00:35:51.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.342597 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:35:51.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.342635 systemd[1]: Stopped systemd-modules-load.service. May 17 00:35:51.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.347648 systemd[1]: Stopping systemd-udevd.service... May 17 00:35:51.350512 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:35:51.353156 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:35:51.353322 systemd[1]: Stopped systemd-resolved.service. May 17 00:35:51.355077 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:35:51.355396 systemd[1]: Stopped systemd-udevd.service. May 17 00:35:51.357455 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:35:51.357529 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:35:51.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.360883 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:35:51.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.360931 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:35:51.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.361971 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:35:51.362036 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:35:51.363498 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:35:51.363562 systemd[1]: Stopped dracut-cmdline.service. May 17 00:35:51.364572 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:35:51.364627 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:35:51.366810 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:35:51.373744 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:35:51.373834 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:35:51.376891 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:35:51.376995 systemd[1]: Stopped network-cleanup.service. May 17 00:35:51.378108 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:35:51.378246 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:35:51.451011 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:35:51.451111 systemd[1]: Stopped sysroot-boot.service. May 17 00:35:51.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.452449 systemd[1]: Reached target initrd-switch-root.target. May 17 00:35:51.453348 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:35:51.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:51.453412 systemd[1]: Stopped initrd-setup-root.service. May 17 00:35:51.455706 systemd[1]: Starting initrd-switch-root.service... May 17 00:35:51.468342 systemd[1]: Switching root. May 17 00:35:51.487775 systemd-journald[185]: Journal stopped May 17 00:35:56.609799 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 17 00:35:56.609875 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:35:56.612298 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:35:56.612331 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:35:56.612349 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:35:56.612372 kernel: SELinux: policy capability open_perms=1 May 17 00:35:56.612390 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:35:56.612407 kernel: SELinux: policy capability always_check_network=0 May 17 00:35:56.612427 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:35:56.612444 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:35:56.612460 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:35:56.612477 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:35:56.612496 systemd[1]: Successfully loaded SELinux policy in 84.235ms. May 17 00:35:56.612530 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.844ms. May 17 00:35:56.612551 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:35:56.612570 systemd[1]: Detected virtualization amazon. May 17 00:35:56.612590 systemd[1]: Detected architecture x86-64. May 17 00:35:56.612897 systemd[1]: Detected first boot. May 17 00:35:56.612926 systemd[1]: Initializing machine ID from VM UUID. May 17 00:35:56.612951 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:35:56.612972 systemd[1]: Populated /etc with preset unit settings. May 17 00:35:56.612996 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:35:56.613026 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:35:56.613049 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:35:56.613077 kernel: kauditd_printk_skb: 48 callbacks suppressed May 17 00:35:56.613098 kernel: audit: type=1334 audit(1747442156.351:88): prog-id=12 op=LOAD May 17 00:35:56.613120 kernel: audit: type=1334 audit(1747442156.351:89): prog-id=3 op=UNLOAD May 17 00:35:56.613143 kernel: audit: type=1334 audit(1747442156.353:90): prog-id=13 op=LOAD May 17 00:35:56.613163 kernel: audit: type=1334 audit(1747442156.354:91): prog-id=14 op=LOAD May 17 00:35:56.613207 kernel: audit: type=1334 audit(1747442156.354:92): prog-id=4 op=UNLOAD May 17 00:35:56.613227 kernel: audit: type=1334 audit(1747442156.354:93): prog-id=5 op=UNLOAD May 17 00:35:56.613251 kernel: audit: type=1334 audit(1747442156.356:94): prog-id=15 op=LOAD May 17 00:35:56.613273 kernel: audit: type=1334 audit(1747442156.357:95): prog-id=12 op=UNLOAD May 17 00:35:56.613294 kernel: audit: type=1334 audit(1747442156.358:96): prog-id=16 op=LOAD May 17 00:35:56.613316 kernel: audit: type=1334 audit(1747442156.362:97): prog-id=17 op=LOAD May 17 00:35:56.613338 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:35:56.613361 systemd[1]: Stopped initrd-switch-root.service. May 17 00:35:56.613384 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:35:56.613407 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:35:56.613429 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:35:56.613456 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 17 00:35:56.613479 systemd[1]: Created slice system-getty.slice. May 17 00:35:56.613501 systemd[1]: Created slice system-modprobe.slice. May 17 00:35:56.613524 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:35:56.613548 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:35:56.613571 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:35:56.613594 systemd[1]: Created slice user.slice. May 17 00:35:56.613622 systemd[1]: Started systemd-ask-password-console.path. May 17 00:35:56.613656 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:35:56.613686 systemd[1]: Set up automount boot.automount. May 17 00:35:56.613709 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:35:56.613733 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:35:56.613754 systemd[1]: Stopped target initrd-fs.target. May 17 00:35:56.613777 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:35:56.613798 systemd[1]: Reached target integritysetup.target. May 17 00:35:56.613822 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:35:56.613845 systemd[1]: Reached target remote-fs.target. May 17 00:35:56.613871 systemd[1]: Reached target slices.target. May 17 00:35:56.613894 systemd[1]: Reached target swap.target. May 17 00:35:56.613918 systemd[1]: Reached target torcx.target. May 17 00:35:56.613940 systemd[1]: Reached target veritysetup.target. May 17 00:35:56.613962 systemd[1]: Listening on systemd-coredump.socket. May 17 00:35:56.613984 systemd[1]: Listening on systemd-initctl.socket. May 17 00:35:56.614008 systemd[1]: Listening on systemd-networkd.socket. May 17 00:35:56.614030 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:35:56.614053 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:35:56.614075 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:35:56.614102 systemd[1]: Mounting dev-hugepages.mount... May 17 00:35:56.614125 systemd[1]: Mounting dev-mqueue.mount... May 17 00:35:56.614149 systemd[1]: Mounting media.mount... May 17 00:35:56.614376 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:56.614407 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:35:56.614427 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:35:56.614446 systemd[1]: Mounting tmp.mount... May 17 00:35:56.614468 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:35:56.614487 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:56.614504 systemd[1]: Starting kmod-static-nodes.service... May 17 00:35:56.614522 systemd[1]: Starting modprobe@configfs.service... May 17 00:35:56.614541 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:56.614560 systemd[1]: Starting modprobe@drm.service... May 17 00:35:56.614583 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:56.614602 systemd[1]: Starting modprobe@fuse.service... May 17 00:35:56.614622 systemd[1]: Starting modprobe@loop.service... May 17 00:35:56.614642 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:35:56.614659 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:35:56.614680 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:35:56.614699 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:35:56.614719 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:35:56.614738 systemd[1]: Stopped systemd-journald.service. May 17 00:35:56.614759 systemd[1]: Starting systemd-journald.service... May 17 00:35:56.614781 systemd[1]: Starting systemd-modules-load.service... May 17 00:35:56.614800 systemd[1]: Starting systemd-network-generator.service... May 17 00:35:56.614818 systemd[1]: Starting systemd-remount-fs.service... May 17 00:35:56.614835 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:35:56.614854 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:35:56.614876 systemd[1]: Stopped verity-setup.service. May 17 00:35:56.614896 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:56.614915 systemd[1]: Mounted dev-hugepages.mount. May 17 00:35:56.614939 systemd[1]: Mounted dev-mqueue.mount. May 17 00:35:56.614958 systemd[1]: Mounted media.mount. May 17 00:35:56.614977 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:35:56.614999 kernel: loop: module loaded May 17 00:35:56.615020 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:35:56.615042 systemd[1]: Mounted tmp.mount. May 17 00:35:56.615062 kernel: fuse: init (API version 7.34) May 17 00:35:56.615080 systemd[1]: Finished kmod-static-nodes.service. May 17 00:35:56.615100 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:35:56.615129 systemd-journald[1407]: Journal started May 17 00:35:56.615637 systemd-journald[1407]: Runtime Journal (/run/log/journal/ec210fc15f6e9cb9f3141c58f19e89f3) is 4.8M, max 38.3M, 33.5M free. May 17 00:35:52.098000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:35:52.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:35:52.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:35:52.271000 audit: BPF prog-id=10 op=LOAD May 17 00:35:52.271000 audit: BPF prog-id=10 op=UNLOAD May 17 00:35:52.271000 audit: BPF prog-id=11 op=LOAD May 17 00:35:56.627884 systemd[1]: Finished modprobe@configfs.service. May 17 00:35:56.627924 systemd[1]: Started systemd-journald.service. May 17 00:35:52.271000 audit: BPF prog-id=11 op=UNLOAD May 17 00:35:52.548000 audit[1331]: AVC avc: denied { associate } for pid=1331 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:35:52.548000 audit[1331]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1314 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.548000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:35:52.551000 audit[1331]: AVC avc: denied { associate } for pid=1331 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:35:52.551000 audit[1331]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=1314 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.551000 audit: CWD cwd="/" May 17 00:35:52.551000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:52.551000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:52.551000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:35:56.351000 audit: BPF prog-id=12 op=LOAD May 17 00:35:56.351000 audit: BPF prog-id=3 op=UNLOAD May 17 00:35:56.353000 audit: BPF prog-id=13 op=LOAD May 17 00:35:56.354000 audit: BPF prog-id=14 op=LOAD May 17 00:35:56.354000 audit: BPF prog-id=4 op=UNLOAD May 17 00:35:56.354000 audit: BPF prog-id=5 op=UNLOAD May 17 00:35:56.356000 audit: BPF prog-id=15 op=LOAD May 17 00:35:56.357000 audit: BPF prog-id=12 op=UNLOAD May 17 00:35:56.358000 audit: BPF prog-id=16 op=LOAD May 17 00:35:56.362000 audit: BPF prog-id=17 op=LOAD May 17 00:35:56.362000 audit: BPF prog-id=13 op=UNLOAD May 17 00:35:56.362000 audit: BPF prog-id=14 op=UNLOAD May 17 00:35:56.364000 audit: BPF prog-id=18 op=LOAD May 17 00:35:56.364000 audit: BPF prog-id=15 op=UNLOAD May 17 00:35:56.371000 audit: BPF prog-id=19 op=LOAD May 17 00:35:56.371000 audit: BPF prog-id=20 op=LOAD May 17 00:35:56.371000 audit: BPF prog-id=16 op=UNLOAD May 17 00:35:56.371000 audit: BPF prog-id=17 op=UNLOAD May 17 00:35:56.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.379000 audit: BPF prog-id=18 op=UNLOAD May 17 00:35:56.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.532000 audit: BPF prog-id=21 op=LOAD May 17 00:35:56.532000 audit: BPF prog-id=22 op=LOAD May 17 00:35:56.532000 audit: BPF prog-id=23 op=LOAD May 17 00:35:56.532000 audit: BPF prog-id=19 op=UNLOAD May 17 00:35:56.532000 audit: BPF prog-id=20 op=UNLOAD May 17 00:35:56.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.606000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:35:56.606000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffcbc2fb120 a2=4000 a3=7ffcbc2fb1bc items=0 ppid=1 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:56.606000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:35:56.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.349650 systemd[1]: Queued start job for default target multi-user.target. May 17 00:35:56.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:52.529618 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:35:56.349664 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. May 17 00:35:52.537518 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:35:56.372139 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:35:52.537542 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:35:56.623720 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:56.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:52.537579 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:35:56.623898 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:52.537590 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:35:56.627678 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:35:52.537634 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:35:56.629226 systemd[1]: Finished modprobe@drm.service. May 17 00:35:52.537649 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:35:56.630664 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:52.537958 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:35:56.630995 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:52.538005 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:35:56.632365 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:35:52.538018 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:35:56.634243 systemd[1]: Finished modprobe@fuse.service. May 17 00:35:52.547779 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:35:56.635529 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:52.547831 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:35:56.635692 systemd[1]: Finished modprobe@loop.service. May 17 00:35:52.547855 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:35:56.636869 systemd[1]: Finished systemd-modules-load.service. May 17 00:35:52.547872 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:35:56.638102 systemd[1]: Finished systemd-network-generator.service. May 17 00:35:52.547900 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:35:56.640275 systemd[1]: Finished systemd-remount-fs.service. May 17 00:35:52.547914 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:35:56.642047 systemd[1]: Reached target network-pre.target. May 17 00:35:55.806161 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:55Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:35:55.806450 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:55Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:35:55.806607 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:55Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:35:55.806842 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:55Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:35:55.806901 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:55Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:35:55.806971 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:35:55Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:35:56.647408 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:35:56.649775 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:35:56.650589 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:35:56.656667 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:35:56.658879 systemd[1]: Starting systemd-journal-flush.service... May 17 00:35:56.659732 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:35:56.663399 systemd[1]: Starting systemd-random-seed.service... May 17 00:35:56.664238 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:35:56.665692 systemd[1]: Starting systemd-sysctl.service... May 17 00:35:56.668917 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:35:56.671762 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:35:56.688564 systemd-journald[1407]: Time spent on flushing to /var/log/journal/ec210fc15f6e9cb9f3141c58f19e89f3 is 86.428ms for 1213 entries. May 17 00:35:56.688564 systemd-journald[1407]: System Journal (/var/log/journal/ec210fc15f6e9cb9f3141c58f19e89f3) is 8.0M, max 195.6M, 187.6M free. May 17 00:35:56.784302 systemd-journald[1407]: Received client request to flush runtime journal. May 17 00:35:56.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.702366 systemd[1]: Finished systemd-random-seed.service. May 17 00:35:56.703403 systemd[1]: Reached target first-boot-complete.target. May 17 00:35:56.787240 udevadm[1451]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 17 00:35:56.745808 systemd[1]: Finished systemd-sysctl.service. May 17 00:35:56.747017 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:35:56.749467 systemd[1]: Starting systemd-sysusers.service... May 17 00:35:56.759953 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:35:56.763331 systemd[1]: Starting systemd-udev-settle.service... May 17 00:35:56.785479 systemd[1]: Finished systemd-journal-flush.service. May 17 00:35:56.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.940918 systemd[1]: Finished systemd-sysusers.service. May 17 00:35:57.360021 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:35:57.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.360000 audit: BPF prog-id=24 op=LOAD May 17 00:35:57.360000 audit: BPF prog-id=25 op=LOAD May 17 00:35:57.360000 audit: BPF prog-id=7 op=UNLOAD May 17 00:35:57.361000 audit: BPF prog-id=8 op=UNLOAD May 17 00:35:57.362014 systemd[1]: Starting systemd-udevd.service... May 17 00:35:57.382019 systemd-udevd[1453]: Using default interface naming scheme 'v252'. May 17 00:35:57.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.453000 audit: BPF prog-id=26 op=LOAD May 17 00:35:57.452506 systemd[1]: Started systemd-udevd.service. May 17 00:35:57.454776 systemd[1]: Starting systemd-networkd.service... May 17 00:35:57.485000 audit: BPF prog-id=27 op=LOAD May 17 00:35:57.485000 audit: BPF prog-id=28 op=LOAD May 17 00:35:57.485000 audit: BPF prog-id=29 op=LOAD May 17 00:35:57.486444 systemd[1]: Starting systemd-userdbd.service... May 17 00:35:57.514770 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:35:57.527264 (udev-worker)[1465]: Network interface NamePolicy= disabled on kernel command line. May 17 00:35:57.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.528217 systemd[1]: Started systemd-userdbd.service. May 17 00:35:57.556196 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:35:57.561842 kernel: ACPI: button: Power Button [PWRF] May 17 00:35:57.561933 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 May 17 00:35:57.551000 audit[1461]: AVC avc: denied { confidentiality } for pid=1461 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:35:57.580194 kernel: ACPI: button: Sleep Button [SLPF] May 17 00:35:57.551000 audit[1461]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563e5ff9d460 a1=338ac a2=7f21d7fe0bc5 a3=5 items=110 ppid=1453 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.551000 audit: CWD cwd="/" May 17 00:35:57.551000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=1 name=(null) inode=15378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=2 name=(null) inode=15378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=3 name=(null) inode=15379 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=4 name=(null) inode=15378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=5 name=(null) inode=15380 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=6 name=(null) inode=15378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=7 name=(null) inode=15381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=8 name=(null) inode=15381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=9 name=(null) inode=15382 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=10 name=(null) inode=15381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=11 name=(null) inode=15383 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=12 name=(null) inode=15381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=13 name=(null) inode=15384 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=14 name=(null) inode=15381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=15 name=(null) inode=15385 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=16 name=(null) inode=15381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=17 name=(null) inode=15386 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=18 name=(null) inode=15378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=19 name=(null) inode=15387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=20 name=(null) inode=15387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=21 name=(null) inode=15388 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=22 name=(null) inode=15387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=23 name=(null) inode=15389 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=24 name=(null) inode=15387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=25 name=(null) inode=15390 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=26 name=(null) inode=15387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=27 name=(null) inode=15391 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=28 name=(null) inode=15387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=29 name=(null) inode=15392 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=30 name=(null) inode=15378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=31 name=(null) inode=15393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=32 name=(null) inode=15393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=33 name=(null) inode=15394 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=34 name=(null) inode=15393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=35 name=(null) inode=15395 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=36 name=(null) inode=15393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=37 name=(null) inode=15396 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=38 name=(null) inode=15393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=39 name=(null) inode=15397 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=40 name=(null) inode=15393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=41 name=(null) inode=15398 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=42 name=(null) inode=15378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=43 name=(null) inode=15399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=44 name=(null) inode=15399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=45 name=(null) inode=15400 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=46 name=(null) inode=15399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=47 name=(null) inode=15401 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=48 name=(null) inode=15399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=49 name=(null) inode=15402 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=50 name=(null) inode=15399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=51 name=(null) inode=15403 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=52 name=(null) inode=15399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=53 name=(null) inode=15404 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=55 name=(null) inode=15405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=56 name=(null) inode=15405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=57 name=(null) inode=15406 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=58 name=(null) inode=15405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=59 name=(null) inode=15407 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=60 name=(null) inode=15405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=61 name=(null) inode=15408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=62 name=(null) inode=15408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=63 name=(null) inode=15409 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=64 name=(null) inode=15408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=65 name=(null) inode=15410 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=66 name=(null) inode=15408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=67 name=(null) inode=15411 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=68 name=(null) inode=15408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=69 name=(null) inode=15412 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=70 name=(null) inode=15408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=71 name=(null) inode=15413 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=72 name=(null) inode=15405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=73 name=(null) inode=15414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=74 name=(null) inode=15414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=75 name=(null) inode=15415 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=76 name=(null) inode=15414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=77 name=(null) inode=15416 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=78 name=(null) inode=15414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=79 name=(null) inode=15417 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=80 name=(null) inode=15414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=81 name=(null) inode=15418 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=82 name=(null) inode=15414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=83 name=(null) inode=15419 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=84 name=(null) inode=15405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=85 name=(null) inode=15420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=86 name=(null) inode=15420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=87 name=(null) inode=15421 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=88 name=(null) inode=15420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=89 name=(null) inode=15422 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=90 name=(null) inode=15420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=91 name=(null) inode=15423 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=92 name=(null) inode=15420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=93 name=(null) inode=15424 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=94 name=(null) inode=15420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=95 name=(null) inode=15425 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=96 name=(null) inode=15405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=97 name=(null) inode=15426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=98 name=(null) inode=15426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=99 name=(null) inode=15427 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=100 name=(null) inode=15426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=101 name=(null) inode=15428 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=102 name=(null) inode=15426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=103 name=(null) inode=15429 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=104 name=(null) inode=15426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=105 name=(null) inode=15430 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=106 name=(null) inode=15426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=107 name=(null) inode=15431 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PATH item=109 name=(null) inode=15434 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.551000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:35:57.623733 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 17 00:35:57.637491 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 May 17 00:35:57.651221 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:35:57.656604 systemd-networkd[1460]: lo: Link UP May 17 00:35:57.656617 systemd-networkd[1460]: lo: Gained carrier May 17 00:35:57.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.657585 systemd-networkd[1460]: Enumeration completed May 17 00:35:57.657726 systemd[1]: Started systemd-networkd.service. May 17 00:35:57.659045 systemd-networkd[1460]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:35:57.660483 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:35:57.667275 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:35:57.667943 systemd-networkd[1460]: eth0: Link UP May 17 00:35:57.668119 systemd-networkd[1460]: eth0: Gained carrier May 17 00:35:57.679333 systemd-networkd[1460]: eth0: DHCPv4 address 172.31.24.63/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 17 00:35:57.771512 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:35:57.778680 systemd[1]: Finished systemd-udev-settle.service. May 17 00:35:57.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.780660 systemd[1]: Starting lvm2-activation-early.service... May 17 00:35:57.854918 lvm[1568]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:35:57.885476 systemd[1]: Finished lvm2-activation-early.service. May 17 00:35:57.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.886401 systemd[1]: Reached target cryptsetup.target. May 17 00:35:57.888129 systemd[1]: Starting lvm2-activation.service... May 17 00:35:57.893347 lvm[1569]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:35:57.921516 systemd[1]: Finished lvm2-activation.service. May 17 00:35:57.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.922305 systemd[1]: Reached target local-fs-pre.target. May 17 00:35:57.922787 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:35:57.922817 systemd[1]: Reached target local-fs.target. May 17 00:35:57.923294 systemd[1]: Reached target machines.target. May 17 00:35:57.925238 systemd[1]: Starting ldconfig.service... May 17 00:35:57.926984 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:57.927060 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:57.928474 systemd[1]: Starting systemd-boot-update.service... May 17 00:35:57.931156 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:35:57.933540 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:35:57.936701 systemd[1]: Starting systemd-sysext.service... May 17 00:35:57.949556 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:35:57.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.956624 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1571 (bootctl) May 17 00:35:57.958153 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:35:57.965599 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:35:57.974619 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:35:57.974816 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:35:57.988334 kernel: loop0: detected capacity change from 0 to 221472 May 17 00:35:58.115205 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:35:58.132203 kernel: loop1: detected capacity change from 0 to 221472 May 17 00:35:58.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.140243 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:35:58.140863 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:35:58.145084 systemd-fsck[1580]: fsck.fat 4.2 (2021-01-31) May 17 00:35:58.145084 systemd-fsck[1580]: /dev/nvme0n1p1: 790 files, 120726/258078 clusters May 17 00:35:58.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.147901 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:35:58.150398 systemd[1]: Mounting boot.mount... May 17 00:35:58.157437 (sd-sysext)[1583]: Using extensions 'kubernetes'. May 17 00:35:58.158884 (sd-sysext)[1583]: Merged extensions into '/usr'. May 17 00:35:58.176412 systemd[1]: Mounted boot.mount. May 17 00:35:58.184004 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:58.186129 systemd[1]: Mounting usr-share-oem.mount... May 17 00:35:58.187418 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:58.190486 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:58.194047 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:58.198450 systemd[1]: Starting modprobe@loop.service... May 17 00:35:58.199368 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:58.199584 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:58.199774 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:58.204905 systemd[1]: Mounted usr-share-oem.mount. May 17 00:35:58.206552 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:58.206743 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:58.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.208069 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:58.208398 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:58.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.209431 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:58.209582 systemd[1]: Finished modprobe@loop.service. May 17 00:35:58.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.214572 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:35:58.215750 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:35:58.216125 systemd[1]: Finished systemd-boot-update.service. May 17 00:35:58.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.217155 systemd[1]: Finished systemd-sysext.service. May 17 00:35:58.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.220159 systemd[1]: Starting ensure-sysext.service... May 17 00:35:58.222612 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:35:58.230928 systemd[1]: Reloading. May 17 00:35:58.290333 systemd-tmpfiles[1602]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:35:58.306343 /usr/lib/systemd/system-generators/torcx-generator[1621]: time="2025-05-17T00:35:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:35:58.306382 /usr/lib/systemd/system-generators/torcx-generator[1621]: time="2025-05-17T00:35:58Z" level=info msg="torcx already run" May 17 00:35:58.313541 systemd-tmpfiles[1602]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:35:58.343407 systemd-tmpfiles[1602]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:35:58.440568 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:35:58.440592 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:35:58.466898 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:35:58.586000 audit: BPF prog-id=30 op=LOAD May 17 00:35:58.586000 audit: BPF prog-id=27 op=UNLOAD May 17 00:35:58.586000 audit: BPF prog-id=31 op=LOAD May 17 00:35:58.586000 audit: BPF prog-id=32 op=LOAD May 17 00:35:58.586000 audit: BPF prog-id=28 op=UNLOAD May 17 00:35:58.586000 audit: BPF prog-id=29 op=UNLOAD May 17 00:35:58.587000 audit: BPF prog-id=33 op=LOAD May 17 00:35:58.587000 audit: BPF prog-id=26 op=UNLOAD May 17 00:35:58.589000 audit: BPF prog-id=34 op=LOAD May 17 00:35:58.589000 audit: BPF prog-id=21 op=UNLOAD May 17 00:35:58.589000 audit: BPF prog-id=35 op=LOAD May 17 00:35:58.589000 audit: BPF prog-id=36 op=LOAD May 17 00:35:58.589000 audit: BPF prog-id=22 op=UNLOAD May 17 00:35:58.589000 audit: BPF prog-id=23 op=UNLOAD May 17 00:35:58.589000 audit: BPF prog-id=37 op=LOAD May 17 00:35:58.590000 audit: BPF prog-id=38 op=LOAD May 17 00:35:58.590000 audit: BPF prog-id=24 op=UNLOAD May 17 00:35:58.590000 audit: BPF prog-id=25 op=UNLOAD May 17 00:35:58.609564 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:58.611928 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:58.616319 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:58.618642 systemd[1]: Starting modprobe@loop.service... May 17 00:35:58.619422 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:58.619672 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:58.621317 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:58.621504 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:58.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.622933 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:58.623103 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:58.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.627667 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:35:58.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.628711 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:58.628879 systemd[1]: Finished modprobe@loop.service. May 17 00:35:58.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.633497 systemd[1]: Starting audit-rules.service... May 17 00:35:58.635869 systemd[1]: Starting clean-ca-certificates.service... May 17 00:35:58.636869 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:58.639360 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:58.642708 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:58.645440 systemd[1]: Starting modprobe@loop.service... May 17 00:35:58.648387 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:58.648595 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:58.650621 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:35:58.654000 audit: BPF prog-id=39 op=LOAD May 17 00:35:58.659973 systemd[1]: Starting systemd-resolved.service... May 17 00:35:58.661000 audit: BPF prog-id=40 op=LOAD May 17 00:35:58.663342 systemd[1]: Starting systemd-timesyncd.service... May 17 00:35:58.666579 systemd[1]: Starting systemd-update-utmp.service... May 17 00:35:58.668825 systemd[1]: Finished clean-ca-certificates.service. May 17 00:35:58.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.670019 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:58.670554 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:58.671765 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:58.671935 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:58.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.673167 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:58.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.673576 systemd[1]: Finished modprobe@loop.service. May 17 00:35:58.682503 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:58.685441 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:58.689594 systemd[1]: Starting modprobe@drm.service... May 17 00:35:58.691000 audit[1690]: SYSTEM_BOOT pid=1690 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:35:58.692120 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:58.696330 systemd[1]: Starting modprobe@loop.service... May 17 00:35:58.697053 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:58.697288 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:58.697520 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:35:58.704663 systemd[1]: Finished ensure-sysext.service. May 17 00:35:58.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.710377 systemd[1]: Finished systemd-update-utmp.service. May 17 00:35:58.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.731222 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:58.731408 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:58.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.732104 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:35:58.738566 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:58.738744 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:58.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.741508 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:35:58.741687 systemd[1]: Finished modprobe@drm.service. May 17 00:35:58.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.742586 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:58.742769 systemd[1]: Finished modprobe@loop.service. May 17 00:35:58.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.743859 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:35:58.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.744600 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:35:58.813110 systemd[1]: Started systemd-timesyncd.service. May 17 00:35:58.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.813848 systemd[1]: Reached target time-set.target. May 17 00:35:58.817788 augenrules[1708]: No rules May 17 00:35:58.817000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:35:58.817000 audit[1708]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc7a9028c0 a2=420 a3=0 items=0 ppid=1681 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.817000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:35:58.818950 systemd[1]: Finished audit-rules.service. May 17 00:35:58.827916 systemd-resolved[1688]: Positive Trust Anchors: May 17 00:35:58.828308 systemd-resolved[1688]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:35:58.828478 systemd-resolved[1688]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:35:58.859816 systemd-resolved[1688]: Defaulting to hostname 'linux'. May 17 00:35:58.862291 systemd[1]: Started systemd-resolved.service. May 17 00:35:58.862824 systemd[1]: Reached target network.target. May 17 00:35:58.863235 systemd[1]: Reached target nss-lookup.target. May 17 00:35:59.803595 systemd-timesyncd[1689]: Contacted time server 147.135.15.159:123 (0.flatcar.pool.ntp.org). May 17 00:35:59.803599 systemd-resolved[1688]: Clock change detected. Flushing caches. May 17 00:35:59.803790 systemd-timesyncd[1689]: Initial clock synchronization to Sat 2025-05-17 00:35:59.803443 UTC. May 17 00:35:59.868119 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:59.868143 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:00.097661 ldconfig[1570]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:36:00.111599 systemd[1]: Finished ldconfig.service. May 17 00:36:00.115244 systemd[1]: Starting systemd-update-done.service... May 17 00:36:00.125791 systemd[1]: Finished systemd-update-done.service. May 17 00:36:00.126811 systemd[1]: Reached target sysinit.target. May 17 00:36:00.127472 systemd[1]: Started motdgen.path. May 17 00:36:00.127959 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:36:00.128557 systemd[1]: Started logrotate.timer. May 17 00:36:00.129046 systemd[1]: Started mdadm.timer. May 17 00:36:00.129519 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:36:00.130224 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:36:00.130280 systemd[1]: Reached target paths.target. May 17 00:36:00.130783 systemd[1]: Reached target timers.target. May 17 00:36:00.131484 systemd[1]: Listening on dbus.socket. May 17 00:36:00.133282 systemd[1]: Starting docker.socket... May 17 00:36:00.139005 systemd[1]: Listening on sshd.socket. May 17 00:36:00.139968 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:00.140568 systemd[1]: Listening on docker.socket. May 17 00:36:00.141083 systemd[1]: Reached target sockets.target. May 17 00:36:00.141680 systemd[1]: Reached target basic.target. May 17 00:36:00.142139 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:36:00.142176 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:36:00.143962 systemd[1]: Starting containerd.service... May 17 00:36:00.146261 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 17 00:36:00.149098 systemd[1]: Starting dbus.service... May 17 00:36:00.151615 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:36:00.155554 systemd[1]: Starting extend-filesystems.service... May 17 00:36:00.158374 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:36:00.162659 systemd[1]: Starting motdgen.service... May 17 00:36:00.167142 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:36:00.169652 systemd[1]: Starting sshd-keygen.service... May 17 00:36:00.176947 systemd[1]: Starting systemd-logind.service... May 17 00:36:00.177572 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:00.177673 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:36:00.178367 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:36:00.179511 systemd[1]: Starting update-engine.service... May 17 00:36:00.181847 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:36:00.212893 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:36:00.213147 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:36:00.214083 jq[1728]: true May 17 00:36:00.216131 jq[1720]: false May 17 00:36:00.217974 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:36:00.218224 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:36:00.241336 jq[1737]: true May 17 00:36:00.276039 dbus-daemon[1719]: [system] SELinux support is enabled May 17 00:36:00.276625 systemd[1]: Started dbus.service. May 17 00:36:00.280389 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:36:00.280441 systemd[1]: Reached target system-config.target. May 17 00:36:00.281034 systemd-networkd[1460]: eth0: Gained IPv6LL May 17 00:36:00.281268 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:36:00.281293 systemd[1]: Reached target user-config.target. May 17 00:36:00.282961 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:36:00.283194 systemd[1]: Finished motdgen.service. May 17 00:36:00.284244 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:36:00.284967 systemd[1]: Reached target network-online.target. May 17 00:36:00.286603 extend-filesystems[1721]: Found loop1 May 17 00:36:00.287564 extend-filesystems[1721]: Found nvme0n1 May 17 00:36:00.287564 extend-filesystems[1721]: Found nvme0n1p1 May 17 00:36:00.287564 extend-filesystems[1721]: Found nvme0n1p2 May 17 00:36:00.287564 extend-filesystems[1721]: Found nvme0n1p3 May 17 00:36:00.287564 extend-filesystems[1721]: Found usr May 17 00:36:00.287564 extend-filesystems[1721]: Found nvme0n1p4 May 17 00:36:00.296959 extend-filesystems[1721]: Found nvme0n1p6 May 17 00:36:00.296959 extend-filesystems[1721]: Found nvme0n1p7 May 17 00:36:00.296959 extend-filesystems[1721]: Found nvme0n1p9 May 17 00:36:00.296959 extend-filesystems[1721]: Checking size of /dev/nvme0n1p9 May 17 00:36:00.288850 systemd[1]: Started amazon-ssm-agent.service. May 17 00:36:00.299757 dbus-daemon[1719]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1460 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 17 00:36:00.292829 systemd[1]: Starting kubelet.service... May 17 00:36:00.301658 dbus-daemon[1719]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:36:00.295581 systemd[1]: Started nvidia.service. May 17 00:36:00.307678 systemd[1]: Starting systemd-hostnamed.service... May 17 00:36:00.424330 bash[1774]: Updated "/home/core/.ssh/authorized_keys" May 17 00:36:00.428467 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:36:00.462950 env[1734]: time="2025-05-17T00:36:00.457651585Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:36:00.467058 extend-filesystems[1721]: Resized partition /dev/nvme0n1p9 May 17 00:36:00.519137 extend-filesystems[1782]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:36:00.538334 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks May 17 00:36:00.585133 systemd-logind[1725]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:36:00.585164 systemd-logind[1725]: Watching system buttons on /dev/input/event2 (Sleep Button) May 17 00:36:00.585189 systemd-logind[1725]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:36:00.588036 systemd-logind[1725]: New seat seat0. May 17 00:36:00.597143 amazon-ssm-agent[1758]: 2025/05/17 00:36:00 Failed to load instance info from vault. RegistrationKey does not exist. May 17 00:36:00.598572 amazon-ssm-agent[1758]: Initializing new seelog logger May 17 00:36:00.598743 amazon-ssm-agent[1758]: New Seelog Logger Creation Complete May 17 00:36:00.598812 amazon-ssm-agent[1758]: 2025/05/17 00:36:00 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. May 17 00:36:00.598812 amazon-ssm-agent[1758]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. May 17 00:36:00.599164 amazon-ssm-agent[1758]: 2025/05/17 00:36:00 processing appconfig overrides May 17 00:36:00.603111 systemd[1]: Started systemd-logind.service. May 17 00:36:00.623303 update_engine[1727]: I0517 00:36:00.621935 1727 main.cc:92] Flatcar Update Engine starting May 17 00:36:00.628571 systemd[1]: Started update-engine.service. May 17 00:36:00.628979 update_engine[1727]: I0517 00:36:00.628650 1727 update_check_scheduler.cc:74] Next update check in 2m42s May 17 00:36:00.631864 systemd[1]: Started locksmithd.service. May 17 00:36:00.653236 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 May 17 00:36:00.671539 extend-filesystems[1782]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required May 17 00:36:00.671539 extend-filesystems[1782]: old_desc_blocks = 1, new_desc_blocks = 1 May 17 00:36:00.671539 extend-filesystems[1782]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. May 17 00:36:00.675581 extend-filesystems[1721]: Resized filesystem in /dev/nvme0n1p9 May 17 00:36:00.671992 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:36:00.672238 systemd[1]: Finished extend-filesystems.service. May 17 00:36:00.745052 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:36:00.747850 env[1734]: time="2025-05-17T00:36:00.746066299Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:36:00.747850 env[1734]: time="2025-05-17T00:36:00.746263322Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:36:00.748543 env[1734]: time="2025-05-17T00:36:00.748492219Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:36:00.748649 env[1734]: time="2025-05-17T00:36:00.748626773Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:36:00.749041 env[1734]: time="2025-05-17T00:36:00.749007908Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:36:00.749153 env[1734]: time="2025-05-17T00:36:00.749129299Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:36:00.749258 env[1734]: time="2025-05-17T00:36:00.749233883Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:36:00.749332 env[1734]: time="2025-05-17T00:36:00.749316049Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:36:00.749512 env[1734]: time="2025-05-17T00:36:00.749491788Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:36:00.749950 env[1734]: time="2025-05-17T00:36:00.749876392Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:36:00.750256 env[1734]: time="2025-05-17T00:36:00.750225015Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:36:00.750340 env[1734]: time="2025-05-17T00:36:00.750319835Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:36:00.750498 env[1734]: time="2025-05-17T00:36:00.750473784Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:36:00.756004 env[1734]: time="2025-05-17T00:36:00.755952858Z" level=info msg="metadata content store policy set" policy=shared May 17 00:36:00.766139 env[1734]: time="2025-05-17T00:36:00.765984697Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:36:00.766139 env[1734]: time="2025-05-17T00:36:00.766041366Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:36:00.766139 env[1734]: time="2025-05-17T00:36:00.766063282Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:36:00.766922 env[1734]: time="2025-05-17T00:36:00.766434559Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:36:00.766922 env[1734]: time="2025-05-17T00:36:00.766495456Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:36:00.766922 env[1734]: time="2025-05-17T00:36:00.766521129Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:36:00.766922 env[1734]: time="2025-05-17T00:36:00.766540986Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:36:00.766922 env[1734]: time="2025-05-17T00:36:00.766567349Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:36:00.766922 env[1734]: time="2025-05-17T00:36:00.766588799Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:36:00.766922 env[1734]: time="2025-05-17T00:36:00.766612127Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:36:00.766922 env[1734]: time="2025-05-17T00:36:00.766636258Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:36:00.766922 env[1734]: time="2025-05-17T00:36:00.766673807Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:36:00.766922 env[1734]: time="2025-05-17T00:36:00.766848030Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:36:00.768114 env[1734]: time="2025-05-17T00:36:00.767469382Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:36:00.768114 env[1734]: time="2025-05-17T00:36:00.767820160Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:36:00.768114 env[1734]: time="2025-05-17T00:36:00.767860464Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:36:00.768114 env[1734]: time="2025-05-17T00:36:00.767881999Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:36:00.768114 env[1734]: time="2025-05-17T00:36:00.767969672Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:36:00.768114 env[1734]: time="2025-05-17T00:36:00.767991675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:36:00.768114 env[1734]: time="2025-05-17T00:36:00.768010547Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:36:00.768114 env[1734]: time="2025-05-17T00:36:00.768029177Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:36:00.768114 env[1734]: time="2025-05-17T00:36:00.768049024Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:36:00.768114 env[1734]: time="2025-05-17T00:36:00.768067736Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:36:00.768114 env[1734]: time="2025-05-17T00:36:00.768084273Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:36:00.768661 env[1734]: time="2025-05-17T00:36:00.768639478Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:36:00.768759 env[1734]: time="2025-05-17T00:36:00.768742876Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:36:00.769003 env[1734]: time="2025-05-17T00:36:00.768982513Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:36:00.769098 env[1734]: time="2025-05-17T00:36:00.769082537Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:36:00.769202 env[1734]: time="2025-05-17T00:36:00.769184719Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:36:00.769279 env[1734]: time="2025-05-17T00:36:00.769265571Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:36:00.769379 env[1734]: time="2025-05-17T00:36:00.769360287Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:36:00.769456 env[1734]: time="2025-05-17T00:36:00.769442605Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:36:00.769537 env[1734]: time="2025-05-17T00:36:00.769521677Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:36:00.769634 env[1734]: time="2025-05-17T00:36:00.769620329Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:36:00.770038 env[1734]: time="2025-05-17T00:36:00.769971631Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:36:00.773112 env[1734]: time="2025-05-17T00:36:00.770191767Z" level=info msg="Connect containerd service" May 17 00:36:00.773112 env[1734]: time="2025-05-17T00:36:00.770239757Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:36:00.773112 env[1734]: time="2025-05-17T00:36:00.771804371Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:36:00.773112 env[1734]: time="2025-05-17T00:36:00.772159297Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:36:00.773112 env[1734]: time="2025-05-17T00:36:00.772209058Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:36:00.772375 systemd[1]: Started containerd.service. May 17 00:36:00.773644 env[1734]: time="2025-05-17T00:36:00.773609660Z" level=info msg="Start subscribing containerd event" May 17 00:36:00.773718 env[1734]: time="2025-05-17T00:36:00.773679720Z" level=info msg="Start recovering state" May 17 00:36:00.773795 env[1734]: time="2025-05-17T00:36:00.773776748Z" level=info msg="Start event monitor" May 17 00:36:00.773851 env[1734]: time="2025-05-17T00:36:00.773835609Z" level=info msg="Start snapshots syncer" May 17 00:36:00.773894 env[1734]: time="2025-05-17T00:36:00.773860528Z" level=info msg="Start cni network conf syncer for default" May 17 00:36:00.773894 env[1734]: time="2025-05-17T00:36:00.773873541Z" level=info msg="Start streaming server" May 17 00:36:00.774018 env[1734]: time="2025-05-17T00:36:00.773998828Z" level=info msg="containerd successfully booted in 0.325516s" May 17 00:36:00.820265 systemd[1]: Created slice system-sshd.slice. May 17 00:36:00.831092 dbus-daemon[1719]: [system] Successfully activated service 'org.freedesktop.hostname1' May 17 00:36:00.831263 systemd[1]: Started systemd-hostnamed.service. May 17 00:36:00.833281 dbus-daemon[1719]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1765 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 17 00:36:00.836884 systemd[1]: Starting polkit.service... May 17 00:36:00.887826 polkitd[1822]: Started polkitd version 121 May 17 00:36:00.910015 polkitd[1822]: Loading rules from directory /etc/polkit-1/rules.d May 17 00:36:00.910100 polkitd[1822]: Loading rules from directory /usr/share/polkit-1/rules.d May 17 00:36:00.911932 polkitd[1822]: Finished loading, compiling and executing 2 rules May 17 00:36:00.912496 dbus-daemon[1719]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 17 00:36:00.912686 systemd[1]: Started polkit.service. May 17 00:36:00.915062 polkitd[1822]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 17 00:36:00.960842 systemd-hostnamed[1765]: Hostname set to (transient) May 17 00:36:00.960969 systemd-resolved[1688]: System hostname changed to 'ip-172-31-24-63'. May 17 00:36:01.013021 coreos-metadata[1718]: May 17 00:36:01.012 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 May 17 00:36:01.017679 coreos-metadata[1718]: May 17 00:36:01.017 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 May 17 00:36:01.019987 coreos-metadata[1718]: May 17 00:36:01.019 INFO Fetch successful May 17 00:36:01.020217 coreos-metadata[1718]: May 17 00:36:01.020 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 May 17 00:36:01.020331 coreos-metadata[1718]: May 17 00:36:01.020 INFO Fetch successful May 17 00:36:01.024743 unknown[1718]: wrote ssh authorized keys file for user: core May 17 00:36:01.050446 update-ssh-keys[1884]: Updated "/home/core/.ssh/authorized_keys" May 17 00:36:01.051452 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 17 00:36:01.209838 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO Create new startup processor May 17 00:36:01.224340 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [LongRunningPluginsManager] registered plugins: {} May 17 00:36:01.224340 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO Initializing bookkeeping folders May 17 00:36:01.224340 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO removing the completed state files May 17 00:36:01.224340 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO Initializing bookkeeping folders for long running plugins May 17 00:36:01.224340 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO Initializing replies folder for MDS reply requests that couldn't reach the service May 17 00:36:01.224340 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO Initializing healthcheck folders for long running plugins May 17 00:36:01.224340 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO Initializing locations for inventory plugin May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO Initializing default location for custom inventory May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO Initializing default location for file inventory May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO Initializing default location for role inventory May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO Init the cloudwatchlogs publisher May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [instanceID=i-012bfda4621b78fde] Successfully loaded platform independent plugin aws:softwareInventory May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [instanceID=i-012bfda4621b78fde] Successfully loaded platform independent plugin aws:updateSsmAgent May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [instanceID=i-012bfda4621b78fde] Successfully loaded platform independent plugin aws:configureDocker May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [instanceID=i-012bfda4621b78fde] Successfully loaded platform independent plugin aws:runDockerAction May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [instanceID=i-012bfda4621b78fde] Successfully loaded platform independent plugin aws:refreshAssociation May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [instanceID=i-012bfda4621b78fde] Successfully loaded platform independent plugin aws:runPowerShellScript May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [instanceID=i-012bfda4621b78fde] Successfully loaded platform independent plugin aws:configurePackage May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [instanceID=i-012bfda4621b78fde] Successfully loaded platform independent plugin aws:downloadContent May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [instanceID=i-012bfda4621b78fde] Successfully loaded platform independent plugin aws:runDocument May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [instanceID=i-012bfda4621b78fde] Successfully loaded platform dependent plugin aws:runShellScript May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 May 17 00:36:01.224720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO OS: linux, Arch: amd64 May 17 00:36:01.232422 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessagingDeliveryService] Starting document processing engine... May 17 00:36:01.235238 amazon-ssm-agent[1758]: datastore file /var/lib/amazon/ssm/i-012bfda4621b78fde/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute May 17 00:36:01.332409 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessagingDeliveryService] [EngineProcessor] Starting May 17 00:36:01.428846 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing May 17 00:36:01.522594 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessagingDeliveryService] Starting message polling May 17 00:36:01.606663 locksmithd[1800]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:36:01.618581 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessagingDeliveryService] Starting send replies to MDS May 17 00:36:01.713440 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [instanceID=i-012bfda4621b78fde] Starting association polling May 17 00:36:01.809157 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting May 17 00:36:01.904438 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessagingDeliveryService] [Association] Launching response handler May 17 00:36:01.999934 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing May 17 00:36:02.095760 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service May 17 00:36:02.192496 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized May 17 00:36:02.288677 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [HealthCheck] HealthCheck reporting agent health. May 17 00:36:02.385024 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessageGatewayService] Starting session document processing engine... May 17 00:36:02.481580 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessageGatewayService] [EngineProcessor] Starting May 17 00:36:02.578283 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. May 17 00:36:02.675661 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-012bfda4621b78fde, requestId: 4f49986e-2dc5-4fc3-b5f9-ca001a3fdfd1 May 17 00:36:02.774661 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [OfflineService] Starting document processing engine... May 17 00:36:02.874639 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [OfflineService] [EngineProcessor] Starting May 17 00:36:02.978671 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [OfflineService] [EngineProcessor] Initial processing May 17 00:36:03.076273 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [OfflineService] Starting message polling May 17 00:36:03.174133 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [OfflineService] Starting send replies to MDS May 17 00:36:03.272224 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [LongRunningPluginsManager] starting long running plugin manager May 17 00:36:03.370445 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute May 17 00:36:03.468850 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessageGatewayService] listening reply. May 17 00:36:03.567524 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck May 17 00:36:03.616639 systemd[1]: Started kubelet.service. May 17 00:36:03.667038 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [StartupProcessor] Executing startup processor tasks May 17 00:36:03.766100 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running May 17 00:36:03.866720 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk May 17 00:36:03.966127 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.7 May 17 00:36:04.065746 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-012bfda4621b78fde?role=subscribe&stream=input May 17 00:36:04.165606 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-012bfda4621b78fde?role=subscribe&stream=input May 17 00:36:04.266815 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessageGatewayService] Starting receiving message from control channel May 17 00:36:04.366994 amazon-ssm-agent[1758]: 2025-05-17 00:36:01 INFO [MessageGatewayService] [EngineProcessor] Initial processing May 17 00:36:04.647009 sshd_keygen[1748]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:36:04.676792 systemd[1]: Finished sshd-keygen.service. May 17 00:36:04.679348 systemd[1]: Starting issuegen.service... May 17 00:36:04.682069 systemd[1]: Started sshd@0-172.31.24.63:22-139.178.68.195:56656.service. May 17 00:36:04.686881 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:36:04.687132 systemd[1]: Finished issuegen.service. May 17 00:36:04.690287 systemd[1]: Starting systemd-user-sessions.service... May 17 00:36:04.703593 systemd[1]: Finished systemd-user-sessions.service. May 17 00:36:04.706262 systemd[1]: Started getty@tty1.service. May 17 00:36:04.709339 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:36:04.711422 systemd[1]: Reached target getty.target. May 17 00:36:04.712419 systemd[1]: Reached target multi-user.target. May 17 00:36:04.716207 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:36:04.730626 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:36:04.730853 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:36:04.731951 systemd[1]: Startup finished in 599ms (kernel) + 6.236s (initrd) + 11.831s (userspace) = 18.666s. May 17 00:36:04.852005 kubelet[1914]: E0517 00:36:04.851969 1914 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:36:04.854812 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:36:04.854948 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:04.855181 systemd[1]: kubelet.service: Consumed 1.326s CPU time. May 17 00:36:04.906246 sshd[1928]: Accepted publickey for core from 139.178.68.195 port 56656 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:04.909500 sshd[1928]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:04.925969 systemd[1]: Created slice user-500.slice. May 17 00:36:04.927393 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:36:04.929726 systemd-logind[1725]: New session 1 of user core. May 17 00:36:04.940544 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:36:04.942242 systemd[1]: Starting user@500.service... May 17 00:36:04.947124 (systemd)[1937]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:05.052308 systemd[1937]: Queued start job for default target default.target. May 17 00:36:05.052841 systemd[1937]: Reached target paths.target. May 17 00:36:05.052864 systemd[1937]: Reached target sockets.target. May 17 00:36:05.052877 systemd[1937]: Reached target timers.target. May 17 00:36:05.052889 systemd[1937]: Reached target basic.target. May 17 00:36:05.053020 systemd[1]: Started user@500.service. May 17 00:36:05.053923 systemd[1]: Started session-1.scope. May 17 00:36:05.054308 systemd[1937]: Reached target default.target. May 17 00:36:05.054649 systemd[1937]: Startup finished in 100ms. May 17 00:36:05.201085 systemd[1]: Started sshd@1-172.31.24.63:22-139.178.68.195:50178.service. May 17 00:36:05.365743 sshd[1946]: Accepted publickey for core from 139.178.68.195 port 50178 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:05.367254 sshd[1946]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:05.371489 systemd-logind[1725]: New session 2 of user core. May 17 00:36:05.372372 systemd[1]: Started session-2.scope. May 17 00:36:05.507197 sshd[1946]: pam_unix(sshd:session): session closed for user core May 17 00:36:05.510540 systemd[1]: sshd@1-172.31.24.63:22-139.178.68.195:50178.service: Deactivated successfully. May 17 00:36:05.511489 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:36:05.512208 systemd-logind[1725]: Session 2 logged out. Waiting for processes to exit. May 17 00:36:05.513068 systemd-logind[1725]: Removed session 2. May 17 00:36:05.532492 systemd[1]: Started sshd@2-172.31.24.63:22-139.178.68.195:50194.service. May 17 00:36:05.689384 sshd[1952]: Accepted publickey for core from 139.178.68.195 port 50194 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:05.690874 sshd[1952]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:05.695915 systemd-logind[1725]: New session 3 of user core. May 17 00:36:05.696389 systemd[1]: Started session-3.scope. May 17 00:36:05.819520 sshd[1952]: pam_unix(sshd:session): session closed for user core May 17 00:36:05.823154 systemd[1]: sshd@2-172.31.24.63:22-139.178.68.195:50194.service: Deactivated successfully. May 17 00:36:05.824048 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:36:05.824713 systemd-logind[1725]: Session 3 logged out. Waiting for processes to exit. May 17 00:36:05.825612 systemd-logind[1725]: Removed session 3. May 17 00:36:05.846043 systemd[1]: Started sshd@3-172.31.24.63:22-139.178.68.195:50202.service. May 17 00:36:06.008811 sshd[1958]: Accepted publickey for core from 139.178.68.195 port 50202 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:06.010273 sshd[1958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:06.016145 systemd[1]: Started session-4.scope. May 17 00:36:06.016806 systemd-logind[1725]: New session 4 of user core. May 17 00:36:06.145504 sshd[1958]: pam_unix(sshd:session): session closed for user core May 17 00:36:06.148487 systemd[1]: sshd@3-172.31.24.63:22-139.178.68.195:50202.service: Deactivated successfully. May 17 00:36:06.149220 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:36:06.149825 systemd-logind[1725]: Session 4 logged out. Waiting for processes to exit. May 17 00:36:06.150725 systemd-logind[1725]: Removed session 4. May 17 00:36:06.171069 systemd[1]: Started sshd@4-172.31.24.63:22-139.178.68.195:50204.service. May 17 00:36:06.333776 sshd[1964]: Accepted publickey for core from 139.178.68.195 port 50204 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:06.335403 sshd[1964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:06.340665 systemd[1]: Started session-5.scope. May 17 00:36:06.341168 systemd-logind[1725]: New session 5 of user core. May 17 00:36:06.485419 sudo[1967]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:36:06.485974 sudo[1967]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:06.494137 dbus-daemon[1719]: \xd0\xfd\xa8\u0018LV: received setenforce notice (enforcing=-1427682944) May 17 00:36:06.496081 sudo[1967]: pam_unix(sudo:session): session closed for user root May 17 00:36:06.521427 sshd[1964]: pam_unix(sshd:session): session closed for user core May 17 00:36:06.524861 systemd[1]: sshd@4-172.31.24.63:22-139.178.68.195:50204.service: Deactivated successfully. May 17 00:36:06.525669 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:36:06.526506 systemd-logind[1725]: Session 5 logged out. Waiting for processes to exit. May 17 00:36:06.527453 systemd-logind[1725]: Removed session 5. May 17 00:36:06.547461 systemd[1]: Started sshd@5-172.31.24.63:22-139.178.68.195:50206.service. May 17 00:36:06.706332 sshd[1971]: Accepted publickey for core from 139.178.68.195 port 50206 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:06.708010 sshd[1971]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:06.713997 systemd-logind[1725]: New session 6 of user core. May 17 00:36:06.714591 systemd[1]: Started session-6.scope. May 17 00:36:06.818333 sudo[1975]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:36:06.818602 sudo[1975]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:06.822653 sudo[1975]: pam_unix(sudo:session): session closed for user root May 17 00:36:06.828426 sudo[1974]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:36:06.828690 sudo[1974]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:06.840164 systemd[1]: Stopping audit-rules.service... May 17 00:36:06.841000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:36:06.842957 kernel: kauditd_printk_skb: 238 callbacks suppressed May 17 00:36:06.843020 kernel: audit: type=1305 audit(1747442166.841:219): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:36:06.845223 auditctl[1978]: No rules May 17 00:36:06.841000 audit[1978]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff2dd52ba0 a2=420 a3=0 items=0 ppid=1 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:06.850571 kernel: audit: type=1300 audit(1747442166.841:219): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff2dd52ba0 a2=420 a3=0 items=0 ppid=1 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:06.845945 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:36:06.846157 systemd[1]: Stopped audit-rules.service. May 17 00:36:06.851155 kernel: audit: type=1327 audit(1747442166.841:219): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:36:06.841000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:36:06.851769 systemd[1]: Starting audit-rules.service... May 17 00:36:06.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.859019 kernel: audit: type=1131 audit(1747442166.845:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.874818 augenrules[1995]: No rules May 17 00:36:06.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.875475 systemd[1]: Finished audit-rules.service. May 17 00:36:06.879928 kernel: audit: type=1130 audit(1747442166.874:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.880084 sudo[1974]: pam_unix(sudo:session): session closed for user root May 17 00:36:06.879000 audit[1974]: USER_END pid=1974 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:06.884927 kernel: audit: type=1106 audit(1747442166.879:222): pid=1974 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:06.884990 kernel: audit: type=1104 audit(1747442166.879:223): pid=1974 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:06.879000 audit[1974]: CRED_DISP pid=1974 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:06.902931 sshd[1971]: pam_unix(sshd:session): session closed for user core May 17 00:36:06.903000 audit[1971]: USER_END pid=1971 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:06.906177 systemd[1]: sshd@5-172.31.24.63:22-139.178.68.195:50206.service: Deactivated successfully. May 17 00:36:06.907021 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:36:06.908372 systemd-logind[1725]: Session 6 logged out. Waiting for processes to exit. May 17 00:36:06.903000 audit[1971]: CRED_DISP pid=1971 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:06.909447 systemd-logind[1725]: Removed session 6. May 17 00:36:06.913325 kernel: audit: type=1106 audit(1747442166.903:224): pid=1971 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:06.913415 kernel: audit: type=1104 audit(1747442166.903:225): pid=1971 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:06.913443 kernel: audit: type=1131 audit(1747442166.903:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.24.63:22-139.178.68.195:50206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.24.63:22-139.178.68.195:50206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.928583 systemd[1]: Started sshd@6-172.31.24.63:22-139.178.68.195:50222.service. May 17 00:36:06.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.24.63:22-139.178.68.195:50222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:07.088000 audit[2001]: USER_ACCT pid=2001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:07.089540 sshd[2001]: Accepted publickey for core from 139.178.68.195 port 50222 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:07.089000 audit[2001]: CRED_ACQ pid=2001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:07.089000 audit[2001]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc00b4e090 a2=3 a3=0 items=0 ppid=1 pid=2001 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.089000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:07.091140 sshd[2001]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:07.096081 systemd[1]: Started session-7.scope. May 17 00:36:07.096405 systemd-logind[1725]: New session 7 of user core. May 17 00:36:07.102000 audit[2001]: USER_START pid=2001 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:07.103000 audit[2003]: CRED_ACQ pid=2003 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:07.201000 audit[2004]: USER_ACCT pid=2004 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:07.201000 audit[2004]: CRED_REFR pid=2004 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:07.202286 sudo[2004]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:36:07.202635 sudo[2004]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:07.203000 audit[2004]: USER_START pid=2004 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:07.217323 systemd[1]: Starting coreos-metadata.service... May 17 00:36:07.295976 coreos-metadata[2008]: May 17 00:36:07.295 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 May 17 00:36:07.296776 coreos-metadata[2008]: May 17 00:36:07.296 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 May 17 00:36:07.297291 coreos-metadata[2008]: May 17 00:36:07.297 INFO Fetch successful May 17 00:36:07.297291 coreos-metadata[2008]: May 17 00:36:07.297 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 May 17 00:36:07.297827 coreos-metadata[2008]: May 17 00:36:07.297 INFO Fetch successful May 17 00:36:07.297827 coreos-metadata[2008]: May 17 00:36:07.297 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 May 17 00:36:07.298301 coreos-metadata[2008]: May 17 00:36:07.298 INFO Fetch successful May 17 00:36:07.298301 coreos-metadata[2008]: May 17 00:36:07.298 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 May 17 00:36:07.298991 coreos-metadata[2008]: May 17 00:36:07.298 INFO Fetch successful May 17 00:36:07.298991 coreos-metadata[2008]: May 17 00:36:07.298 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 May 17 00:36:07.299544 coreos-metadata[2008]: May 17 00:36:07.299 INFO Fetch successful May 17 00:36:07.299544 coreos-metadata[2008]: May 17 00:36:07.299 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 May 17 00:36:07.300096 coreos-metadata[2008]: May 17 00:36:07.300 INFO Fetch successful May 17 00:36:07.300182 coreos-metadata[2008]: May 17 00:36:07.300 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 May 17 00:36:07.300742 coreos-metadata[2008]: May 17 00:36:07.300 INFO Fetch successful May 17 00:36:07.300742 coreos-metadata[2008]: May 17 00:36:07.300 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 May 17 00:36:07.301207 coreos-metadata[2008]: May 17 00:36:07.301 INFO Fetch successful May 17 00:36:07.311143 systemd[1]: Finished coreos-metadata.service. May 17 00:36:07.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:08.375129 systemd[1]: Stopped kubelet.service. May 17 00:36:08.375756 systemd[1]: kubelet.service: Consumed 1.326s CPU time. May 17 00:36:08.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:08.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:08.379098 systemd[1]: Starting kubelet.service... May 17 00:36:08.420288 systemd[1]: Reloading. May 17 00:36:08.542324 /usr/lib/systemd/system-generators/torcx-generator[2062]: time="2025-05-17T00:36:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:36:08.542377 /usr/lib/systemd/system-generators/torcx-generator[2062]: time="2025-05-17T00:36:08Z" level=info msg="torcx already run" May 17 00:36:08.670633 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:36:08.670658 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:36:08.689544 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:36:08.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.786000 audit: BPF prog-id=49 op=LOAD May 17 00:36:08.786000 audit: BPF prog-id=41 op=UNLOAD May 17 00:36:08.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit: BPF prog-id=50 op=LOAD May 17 00:36:08.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.787000 audit: BPF prog-id=51 op=LOAD May 17 00:36:08.787000 audit: BPF prog-id=42 op=UNLOAD May 17 00:36:08.787000 audit: BPF prog-id=43 op=UNLOAD May 17 00:36:08.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.788000 audit: BPF prog-id=52 op=LOAD May 17 00:36:08.788000 audit: BPF prog-id=40 op=UNLOAD May 17 00:36:08.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.790000 audit: BPF prog-id=53 op=LOAD May 17 00:36:08.790000 audit: BPF prog-id=47 op=UNLOAD May 17 00:36:08.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit: BPF prog-id=54 op=LOAD May 17 00:36:08.791000 audit: BPF prog-id=44 op=UNLOAD May 17 00:36:08.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit: BPF prog-id=55 op=LOAD May 17 00:36:08.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.792000 audit: BPF prog-id=56 op=LOAD May 17 00:36:08.792000 audit: BPF prog-id=45 op=UNLOAD May 17 00:36:08.792000 audit: BPF prog-id=46 op=UNLOAD May 17 00:36:08.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit: BPF prog-id=57 op=LOAD May 17 00:36:08.794000 audit: BPF prog-id=30 op=UNLOAD May 17 00:36:08.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit: BPF prog-id=58 op=LOAD May 17 00:36:08.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.794000 audit: BPF prog-id=59 op=LOAD May 17 00:36:08.794000 audit: BPF prog-id=31 op=UNLOAD May 17 00:36:08.794000 audit: BPF prog-id=32 op=UNLOAD May 17 00:36:08.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.795000 audit: BPF prog-id=60 op=LOAD May 17 00:36:08.795000 audit: BPF prog-id=33 op=UNLOAD May 17 00:36:08.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.796000 audit: BPF prog-id=61 op=LOAD May 17 00:36:08.796000 audit: BPF prog-id=39 op=UNLOAD May 17 00:36:08.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit: BPF prog-id=62 op=LOAD May 17 00:36:08.798000 audit: BPF prog-id=34 op=UNLOAD May 17 00:36:08.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit: BPF prog-id=63 op=LOAD May 17 00:36:08.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.798000 audit: BPF prog-id=64 op=LOAD May 17 00:36:08.798000 audit: BPF prog-id=35 op=UNLOAD May 17 00:36:08.798000 audit: BPF prog-id=36 op=UNLOAD May 17 00:36:08.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit: BPF prog-id=65 op=LOAD May 17 00:36:08.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.799000 audit: BPF prog-id=66 op=LOAD May 17 00:36:08.799000 audit: BPF prog-id=37 op=UNLOAD May 17 00:36:08.799000 audit: BPF prog-id=38 op=UNLOAD May 17 00:36:08.821638 systemd[1]: Started kubelet.service. May 17 00:36:08.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:08.823931 systemd[1]: Stopping kubelet.service... May 17 00:36:08.825029 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:36:08.825241 systemd[1]: Stopped kubelet.service. May 17 00:36:08.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:08.827233 systemd[1]: Starting kubelet.service... May 17 00:36:09.042996 systemd[1]: Started kubelet.service. May 17 00:36:09.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.091067 kubelet[2125]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:36:09.091373 kubelet[2125]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:36:09.091413 kubelet[2125]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:36:09.091535 kubelet[2125]: I0517 00:36:09.091510 2125 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:36:09.517458 kubelet[2125]: I0517 00:36:09.517413 2125 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:36:09.517458 kubelet[2125]: I0517 00:36:09.517453 2125 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:36:09.518075 kubelet[2125]: I0517 00:36:09.518051 2125 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:36:09.573835 kubelet[2125]: I0517 00:36:09.573793 2125 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:36:09.583315 kubelet[2125]: E0517 00:36:09.583270 2125 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:36:09.583315 kubelet[2125]: I0517 00:36:09.583319 2125 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:36:09.587940 kubelet[2125]: I0517 00:36:09.587909 2125 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:36:09.588954 kubelet[2125]: I0517 00:36:09.588927 2125 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:36:09.589179 kubelet[2125]: I0517 00:36:09.589144 2125 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:36:09.589393 kubelet[2125]: I0517 00:36:09.589180 2125 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.24.63","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:36:09.589561 kubelet[2125]: I0517 00:36:09.589409 2125 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:36:09.589561 kubelet[2125]: I0517 00:36:09.589422 2125 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:36:09.589561 kubelet[2125]: I0517 00:36:09.589547 2125 state_mem.go:36] "Initialized new in-memory state store" May 17 00:36:09.595425 kubelet[2125]: I0517 00:36:09.595366 2125 kubelet.go:408] "Attempting to sync node with API server" May 17 00:36:09.595425 kubelet[2125]: I0517 00:36:09.595427 2125 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:36:09.595601 kubelet[2125]: I0517 00:36:09.595471 2125 kubelet.go:314] "Adding apiserver pod source" May 17 00:36:09.595601 kubelet[2125]: I0517 00:36:09.595491 2125 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:36:09.600076 kubelet[2125]: E0517 00:36:09.599893 2125 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:09.600076 kubelet[2125]: E0517 00:36:09.599966 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:09.607991 kubelet[2125]: I0517 00:36:09.607961 2125 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:36:09.608625 kubelet[2125]: I0517 00:36:09.608601 2125 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:36:09.609610 kubelet[2125]: W0517 00:36:09.609581 2125 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:36:09.612747 kubelet[2125]: I0517 00:36:09.612719 2125 server.go:1274] "Started kubelet" May 17 00:36:09.613000 audit[2125]: AVC avc: denied { mac_admin } for pid=2125 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.613000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:36:09.613000 audit[2125]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006b7140 a1=c000a4e480 a2=c0006b7110 a3=25 items=0 ppid=1 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.613000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:36:09.613000 audit[2125]: AVC avc: denied { mac_admin } for pid=2125 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.613000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:36:09.613000 audit[2125]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000358880 a1=c000a4e498 a2=c0006b71d0 a3=25 items=0 ppid=1 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.613000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:36:09.615262 kubelet[2125]: I0517 00:36:09.613996 2125 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:36:09.615262 kubelet[2125]: I0517 00:36:09.614046 2125 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:36:09.615262 kubelet[2125]: I0517 00:36:09.614122 2125 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:36:09.624682 kubelet[2125]: I0517 00:36:09.624573 2125 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:36:09.625441 kubelet[2125]: I0517 00:36:09.625412 2125 server.go:449] "Adding debug handlers to kubelet server" May 17 00:36:09.626532 kubelet[2125]: I0517 00:36:09.626337 2125 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:36:09.626779 kubelet[2125]: I0517 00:36:09.626739 2125 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:36:09.627020 kubelet[2125]: I0517 00:36:09.626998 2125 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:36:09.627559 kubelet[2125]: I0517 00:36:09.627532 2125 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:36:09.628400 kubelet[2125]: E0517 00:36:09.628381 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:09.630783 kubelet[2125]: I0517 00:36:09.630768 2125 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:36:09.630996 kubelet[2125]: I0517 00:36:09.630988 2125 reconciler.go:26] "Reconciler: start to sync state" May 17 00:36:09.632113 kubelet[2125]: I0517 00:36:09.632093 2125 factory.go:221] Registration of the containerd container factory successfully May 17 00:36:09.632113 kubelet[2125]: I0517 00:36:09.632111 2125 factory.go:221] Registration of the systemd container factory successfully May 17 00:36:09.632219 kubelet[2125]: I0517 00:36:09.632194 2125 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:36:09.657390 kubelet[2125]: E0517 00:36:09.657339 2125 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:36:09.662152 kubelet[2125]: I0517 00:36:09.661883 2125 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:36:09.662152 kubelet[2125]: I0517 00:36:09.661921 2125 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:36:09.662152 kubelet[2125]: I0517 00:36:09.661943 2125 state_mem.go:36] "Initialized new in-memory state store" May 17 00:36:09.663537 kubelet[2125]: E0517 00:36:09.660799 2125 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.24.63.18402965194d34c4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.24.63,UID:172.31.24.63,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.24.63,},FirstTimestamp:2025-05-17 00:36:09.61267834 +0000 UTC m=+0.562493889,LastTimestamp:2025-05-17 00:36:09.61267834 +0000 UTC m=+0.562493889,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.24.63,}" May 17 00:36:09.663537 kubelet[2125]: W0517 00:36:09.662874 2125 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 17 00:36:09.663537 kubelet[2125]: E0517 00:36:09.662919 2125 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" May 17 00:36:09.663537 kubelet[2125]: W0517 00:36:09.662993 2125 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.24.63" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 17 00:36:09.663537 kubelet[2125]: E0517 00:36:09.663006 2125 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"172.31.24.63\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 17 00:36:09.667126 kubelet[2125]: I0517 00:36:09.667110 2125 policy_none.go:49] "None policy: Start" May 17 00:36:09.679306 kubelet[2125]: I0517 00:36:09.679282 2125 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:36:09.679572 kubelet[2125]: I0517 00:36:09.679558 2125 state_mem.go:35] "Initializing new in-memory state store" May 17 00:36:09.680952 kubelet[2125]: W0517 00:36:09.680885 2125 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope May 17 00:36:09.681150 kubelet[2125]: E0517 00:36:09.681129 2125 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" May 17 00:36:09.682979 kubelet[2125]: E0517 00:36:09.682861 2125 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.24.63.184029651bf66b25 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.24.63,UID:172.31.24.63,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.31.24.63,},FirstTimestamp:2025-05-17 00:36:09.657322277 +0000 UTC m=+0.607137826,LastTimestamp:2025-05-17 00:36:09.657322277 +0000 UTC m=+0.607137826,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.24.63,}" May 17 00:36:09.683660 kubelet[2125]: E0517 00:36:09.683629 2125 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.24.63\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" May 17 00:36:09.692653 kubelet[2125]: E0517 00:36:09.689345 2125 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.24.63.184029651c3361f2 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.24.63,UID:172.31.24.63,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 172.31.24.63 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:172.31.24.63,},FirstTimestamp:2025-05-17 00:36:09.661317618 +0000 UTC m=+0.611133152,LastTimestamp:2025-05-17 00:36:09.661317618 +0000 UTC m=+0.611133152,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.24.63,}" May 17 00:36:09.691849 systemd[1]: Created slice kubepods.slice. May 17 00:36:09.695000 audit[2141]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:09.695000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff7ea2ae20 a2=0 a3=7fff7ea2ae0c items=0 ppid=2125 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.695000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:36:09.698000 audit[2144]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:09.699048 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:36:09.698000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff6aaba650 a2=0 a3=7fff6aaba63c items=0 ppid=2125 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.698000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:36:09.701284 kubelet[2125]: E0517 00:36:09.701206 2125 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.24.63.184029651c3376fd default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.24.63,UID:172.31.24.63,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 172.31.24.63 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:172.31.24.63,},FirstTimestamp:2025-05-17 00:36:09.661323005 +0000 UTC m=+0.611138536,LastTimestamp:2025-05-17 00:36:09.661323005 +0000 UTC m=+0.611138536,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.24.63,}" May 17 00:36:09.708068 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:36:09.710991 kubelet[2125]: E0517 00:36:09.710879 2125 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.24.63.184029651c338337 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.24.63,UID:172.31.24.63,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 172.31.24.63 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:172.31.24.63,},FirstTimestamp:2025-05-17 00:36:09.661326135 +0000 UTC m=+0.611141666,LastTimestamp:2025-05-17 00:36:09.661326135 +0000 UTC m=+0.611141666,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.24.63,}" May 17 00:36:09.712734 kubelet[2125]: I0517 00:36:09.712709 2125 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:36:09.711000 audit[2125]: AVC avc: denied { mac_admin } for pid=2125 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.711000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:36:09.711000 audit[2125]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cfb800 a1=c0005bcd20 a2=c000cfb7d0 a3=25 items=0 ppid=1 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.711000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:36:09.713083 kubelet[2125]: I0517 00:36:09.712771 2125 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:36:09.713083 kubelet[2125]: I0517 00:36:09.712891 2125 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:36:09.713083 kubelet[2125]: I0517 00:36:09.712930 2125 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:36:09.714110 kubelet[2125]: I0517 00:36:09.713636 2125 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:36:09.717274 kubelet[2125]: E0517 00:36:09.717253 2125 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.24.63\" not found" May 17 00:36:09.734834 kubelet[2125]: E0517 00:36:09.734733 2125 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.24.63.184029651f655eb2 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.24.63,UID:172.31.24.63,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:172.31.24.63,},FirstTimestamp:2025-05-17 00:36:09.714925234 +0000 UTC m=+0.664740778,LastTimestamp:2025-05-17 00:36:09.714925234 +0000 UTC m=+0.664740778,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.24.63,}" May 17 00:36:09.701000 audit[2146]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:09.701000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe73ecceb0 a2=0 a3=7ffe73ecce9c items=0 ppid=2125 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.701000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:36:09.738000 audit[2153]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:09.738000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe15e3a6d0 a2=0 a3=7ffe15e3a6bc items=0 ppid=2125 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:36:09.814964 kubelet[2125]: I0517 00:36:09.814803 2125 kubelet_node_status.go:72] "Attempting to register node" node="172.31.24.63" May 17 00:36:09.843445 kubelet[2125]: I0517 00:36:09.843413 2125 kubelet_node_status.go:75] "Successfully registered node" node="172.31.24.63" May 17 00:36:09.843603 kubelet[2125]: E0517 00:36:09.843456 2125 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"172.31.24.63\": node \"172.31.24.63\" not found" May 17 00:36:09.844000 audit[2158]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:09.844000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdf6d6a910 a2=0 a3=7ffdf6d6a8fc items=0 ppid=2125 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:36:09.845729 kubelet[2125]: I0517 00:36:09.845684 2125 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:36:09.846000 audit[2159]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:09.846000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcf45b9c90 a2=0 a3=7ffcf45b9c7c items=0 ppid=2125 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.846000 audit[2160]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:09.846000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf24250e0 a2=0 a3=7ffdf24250cc items=0 ppid=2125 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.846000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:36:09.846000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:36:09.848247 kubelet[2125]: I0517 00:36:09.848222 2125 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:36:09.848377 kubelet[2125]: I0517 00:36:09.848366 2125 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:36:09.848619 kubelet[2125]: I0517 00:36:09.848606 2125 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:36:09.848842 kubelet[2125]: E0517 00:36:09.848824 2125 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 17 00:36:09.848000 audit[2161]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:09.848000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd22b481d0 a2=0 a3=7ffd22b481bc items=0 ppid=2125 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.848000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:36:09.850000 audit[2162]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:09.850000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe03ad97d0 a2=0 a3=7ffe03ad97bc items=0 ppid=2125 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:36:09.851000 audit[2163]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:09.851000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3ce9acf0 a2=0 a3=7ffc3ce9acdc items=0 ppid=2125 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:36:09.852000 audit[2164]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:09.852000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff9f0710c0 a2=0 a3=7fff9f0710ac items=0 ppid=2125 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.852000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:36:09.853000 audit[2165]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:09.853000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffebde82930 a2=0 a3=7ffebde8291c items=0 ppid=2125 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:36:09.862641 kubelet[2125]: I0517 00:36:09.862585 2125 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 17 00:36:09.863179 env[1734]: time="2025-05-17T00:36:09.863140427Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:36:09.863508 kubelet[2125]: I0517 00:36:09.863346 2125 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 17 00:36:09.881101 kubelet[2125]: E0517 00:36:09.881066 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:09.981689 kubelet[2125]: E0517 00:36:09.981630 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:10.081851 kubelet[2125]: E0517 00:36:10.081735 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:10.098001 sudo[2004]: pam_unix(sudo:session): session closed for user root May 17 00:36:10.097000 audit[2004]: USER_END pid=2004 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:10.097000 audit[2004]: CRED_DISP pid=2004 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:10.122038 sshd[2001]: pam_unix(sshd:session): session closed for user core May 17 00:36:10.122000 audit[2001]: USER_END pid=2001 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:10.123000 audit[2001]: CRED_DISP pid=2001 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:10.125505 systemd[1]: sshd@6-172.31.24.63:22-139.178.68.195:50222.service: Deactivated successfully. May 17 00:36:10.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.24.63:22-139.178.68.195:50222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:10.126674 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:36:10.127495 systemd-logind[1725]: Session 7 logged out. Waiting for processes to exit. May 17 00:36:10.128554 systemd-logind[1725]: Removed session 7. May 17 00:36:10.182347 kubelet[2125]: E0517 00:36:10.182089 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:10.283015 kubelet[2125]: E0517 00:36:10.282980 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:10.383715 kubelet[2125]: E0517 00:36:10.383672 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:10.484430 kubelet[2125]: E0517 00:36:10.484389 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:10.520743 kubelet[2125]: I0517 00:36:10.520679 2125 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 17 00:36:10.520932 kubelet[2125]: W0517 00:36:10.520842 2125 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 17 00:36:10.584759 kubelet[2125]: E0517 00:36:10.584713 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:10.600985 kubelet[2125]: E0517 00:36:10.600941 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:10.685420 kubelet[2125]: E0517 00:36:10.685317 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:10.785819 kubelet[2125]: E0517 00:36:10.785774 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:10.886845 kubelet[2125]: E0517 00:36:10.886800 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:10.987812 kubelet[2125]: E0517 00:36:10.987689 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:11.088782 kubelet[2125]: E0517 00:36:11.088713 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:11.189036 kubelet[2125]: E0517 00:36:11.188844 2125 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.24.63\" not found" May 17 00:36:11.601329 kubelet[2125]: E0517 00:36:11.601299 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:11.601499 kubelet[2125]: I0517 00:36:11.601335 2125 apiserver.go:52] "Watching apiserver" May 17 00:36:11.607866 kubelet[2125]: E0517 00:36:11.607796 2125 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rxhbw" podUID="d1b15cac-f557-4eeb-9187-ac2f4bb11e6e" May 17 00:36:11.614816 systemd[1]: Created slice kubepods-besteffort-pod74a13e61_b1ee_4348_9c09_b2821a56e2ec.slice. May 17 00:36:11.627076 systemd[1]: Created slice kubepods-besteffort-pod50c31ba8_d3dd_42e9_81e0_5c396cfbaff6.slice. May 17 00:36:11.632043 kubelet[2125]: I0517 00:36:11.632017 2125 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:36:11.642834 kubelet[2125]: I0517 00:36:11.642795 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/50c31ba8-d3dd-42e9-81e0-5c396cfbaff6-cni-bin-dir\") pod \"calico-node-zb7kk\" (UID: \"50c31ba8-d3dd-42e9-81e0-5c396cfbaff6\") " pod="calico-system/calico-node-zb7kk" May 17 00:36:11.642834 kubelet[2125]: I0517 00:36:11.642831 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/74a13e61-b1ee-4348-9c09-b2821a56e2ec-kube-proxy\") pod \"kube-proxy-xnj6s\" (UID: \"74a13e61-b1ee-4348-9c09-b2821a56e2ec\") " pod="kube-system/kube-proxy-xnj6s" May 17 00:36:11.643038 kubelet[2125]: I0517 00:36:11.642852 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/74a13e61-b1ee-4348-9c09-b2821a56e2ec-lib-modules\") pod \"kube-proxy-xnj6s\" (UID: \"74a13e61-b1ee-4348-9c09-b2821a56e2ec\") " pod="kube-system/kube-proxy-xnj6s" May 17 00:36:11.643038 kubelet[2125]: I0517 00:36:11.642874 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vv2g6\" (UniqueName: \"kubernetes.io/projected/d1b15cac-f557-4eeb-9187-ac2f4bb11e6e-kube-api-access-vv2g6\") pod \"csi-node-driver-rxhbw\" (UID: \"d1b15cac-f557-4eeb-9187-ac2f4bb11e6e\") " pod="calico-system/csi-node-driver-rxhbw" May 17 00:36:11.643038 kubelet[2125]: I0517 00:36:11.642895 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/50c31ba8-d3dd-42e9-81e0-5c396cfbaff6-cni-net-dir\") pod \"calico-node-zb7kk\" (UID: \"50c31ba8-d3dd-42e9-81e0-5c396cfbaff6\") " pod="calico-system/calico-node-zb7kk" May 17 00:36:11.643038 kubelet[2125]: I0517 00:36:11.642937 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/50c31ba8-d3dd-42e9-81e0-5c396cfbaff6-node-certs\") pod \"calico-node-zb7kk\" (UID: \"50c31ba8-d3dd-42e9-81e0-5c396cfbaff6\") " pod="calico-system/calico-node-zb7kk" May 17 00:36:11.643038 kubelet[2125]: I0517 00:36:11.642954 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/50c31ba8-d3dd-42e9-81e0-5c396cfbaff6-var-run-calico\") pod \"calico-node-zb7kk\" (UID: \"50c31ba8-d3dd-42e9-81e0-5c396cfbaff6\") " pod="calico-system/calico-node-zb7kk" May 17 00:36:11.643169 kubelet[2125]: I0517 00:36:11.642973 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d1b15cac-f557-4eeb-9187-ac2f4bb11e6e-kubelet-dir\") pod \"csi-node-driver-rxhbw\" (UID: \"d1b15cac-f557-4eeb-9187-ac2f4bb11e6e\") " pod="calico-system/csi-node-driver-rxhbw" May 17 00:36:11.643169 kubelet[2125]: I0517 00:36:11.642991 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d1b15cac-f557-4eeb-9187-ac2f4bb11e6e-socket-dir\") pod \"csi-node-driver-rxhbw\" (UID: \"d1b15cac-f557-4eeb-9187-ac2f4bb11e6e\") " pod="calico-system/csi-node-driver-rxhbw" May 17 00:36:11.643169 kubelet[2125]: I0517 00:36:11.643008 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/50c31ba8-d3dd-42e9-81e0-5c396cfbaff6-lib-modules\") pod \"calico-node-zb7kk\" (UID: \"50c31ba8-d3dd-42e9-81e0-5c396cfbaff6\") " pod="calico-system/calico-node-zb7kk" May 17 00:36:11.643169 kubelet[2125]: I0517 00:36:11.643026 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/50c31ba8-d3dd-42e9-81e0-5c396cfbaff6-policysync\") pod \"calico-node-zb7kk\" (UID: \"50c31ba8-d3dd-42e9-81e0-5c396cfbaff6\") " pod="calico-system/calico-node-zb7kk" May 17 00:36:11.643169 kubelet[2125]: I0517 00:36:11.643042 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/50c31ba8-d3dd-42e9-81e0-5c396cfbaff6-xtables-lock\") pod \"calico-node-zb7kk\" (UID: \"50c31ba8-d3dd-42e9-81e0-5c396cfbaff6\") " pod="calico-system/calico-node-zb7kk" May 17 00:36:11.643295 kubelet[2125]: I0517 00:36:11.643075 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d1b15cac-f557-4eeb-9187-ac2f4bb11e6e-varrun\") pod \"csi-node-driver-rxhbw\" (UID: \"d1b15cac-f557-4eeb-9187-ac2f4bb11e6e\") " pod="calico-system/csi-node-driver-rxhbw" May 17 00:36:11.643295 kubelet[2125]: I0517 00:36:11.643094 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/50c31ba8-d3dd-42e9-81e0-5c396cfbaff6-flexvol-driver-host\") pod \"calico-node-zb7kk\" (UID: \"50c31ba8-d3dd-42e9-81e0-5c396cfbaff6\") " pod="calico-system/calico-node-zb7kk" May 17 00:36:11.643295 kubelet[2125]: I0517 00:36:11.643114 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ff6v8\" (UniqueName: \"kubernetes.io/projected/74a13e61-b1ee-4348-9c09-b2821a56e2ec-kube-api-access-ff6v8\") pod \"kube-proxy-xnj6s\" (UID: \"74a13e61-b1ee-4348-9c09-b2821a56e2ec\") " pod="kube-system/kube-proxy-xnj6s" May 17 00:36:11.643295 kubelet[2125]: I0517 00:36:11.643130 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/50c31ba8-d3dd-42e9-81e0-5c396cfbaff6-cni-log-dir\") pod \"calico-node-zb7kk\" (UID: \"50c31ba8-d3dd-42e9-81e0-5c396cfbaff6\") " pod="calico-system/calico-node-zb7kk" May 17 00:36:11.643295 kubelet[2125]: I0517 00:36:11.643155 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/50c31ba8-d3dd-42e9-81e0-5c396cfbaff6-tigera-ca-bundle\") pod \"calico-node-zb7kk\" (UID: \"50c31ba8-d3dd-42e9-81e0-5c396cfbaff6\") " pod="calico-system/calico-node-zb7kk" May 17 00:36:11.643421 kubelet[2125]: I0517 00:36:11.643175 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/50c31ba8-d3dd-42e9-81e0-5c396cfbaff6-var-lib-calico\") pod \"calico-node-zb7kk\" (UID: \"50c31ba8-d3dd-42e9-81e0-5c396cfbaff6\") " pod="calico-system/calico-node-zb7kk" May 17 00:36:11.643421 kubelet[2125]: I0517 00:36:11.643194 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bkf95\" (UniqueName: \"kubernetes.io/projected/50c31ba8-d3dd-42e9-81e0-5c396cfbaff6-kube-api-access-bkf95\") pod \"calico-node-zb7kk\" (UID: \"50c31ba8-d3dd-42e9-81e0-5c396cfbaff6\") " pod="calico-system/calico-node-zb7kk" May 17 00:36:11.643421 kubelet[2125]: I0517 00:36:11.643211 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d1b15cac-f557-4eeb-9187-ac2f4bb11e6e-registration-dir\") pod \"csi-node-driver-rxhbw\" (UID: \"d1b15cac-f557-4eeb-9187-ac2f4bb11e6e\") " pod="calico-system/csi-node-driver-rxhbw" May 17 00:36:11.643421 kubelet[2125]: I0517 00:36:11.643226 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/74a13e61-b1ee-4348-9c09-b2821a56e2ec-xtables-lock\") pod \"kube-proxy-xnj6s\" (UID: \"74a13e61-b1ee-4348-9c09-b2821a56e2ec\") " pod="kube-system/kube-proxy-xnj6s" May 17 00:36:11.746339 kubelet[2125]: I0517 00:36:11.746300 2125 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:36:11.747366 kubelet[2125]: E0517 00:36:11.747341 2125 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:36:11.747525 kubelet[2125]: W0517 00:36:11.747506 2125 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:36:11.747640 kubelet[2125]: E0517 00:36:11.747625 2125 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:36:11.755304 kubelet[2125]: E0517 00:36:11.755247 2125 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:36:11.755531 kubelet[2125]: W0517 00:36:11.755513 2125 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:36:11.755719 kubelet[2125]: E0517 00:36:11.755692 2125 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:36:11.793607 kubelet[2125]: E0517 00:36:11.793580 2125 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:36:11.793607 kubelet[2125]: W0517 00:36:11.793599 2125 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:36:11.793778 kubelet[2125]: E0517 00:36:11.793619 2125 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:36:11.805058 kubelet[2125]: E0517 00:36:11.805032 2125 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:36:11.805247 kubelet[2125]: W0517 00:36:11.805229 2125 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:36:11.805404 kubelet[2125]: E0517 00:36:11.805387 2125 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:36:11.812665 kubelet[2125]: E0517 00:36:11.812632 2125 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:36:11.812810 kubelet[2125]: W0517 00:36:11.812776 2125 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:36:11.812869 kubelet[2125]: E0517 00:36:11.812806 2125 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:36:11.926745 env[1734]: time="2025-05-17T00:36:11.926686447Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xnj6s,Uid:74a13e61-b1ee-4348-9c09-b2821a56e2ec,Namespace:kube-system,Attempt:0,}" May 17 00:36:11.932277 env[1734]: time="2025-05-17T00:36:11.931076149Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zb7kk,Uid:50c31ba8-d3dd-42e9-81e0-5c396cfbaff6,Namespace:calico-system,Attempt:0,}" May 17 00:36:12.437585 env[1734]: time="2025-05-17T00:36:12.437536716Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:12.438780 env[1734]: time="2025-05-17T00:36:12.438744282Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:12.440831 env[1734]: time="2025-05-17T00:36:12.440797537Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:12.444230 env[1734]: time="2025-05-17T00:36:12.444194522Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:12.447739 env[1734]: time="2025-05-17T00:36:12.447699050Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:12.449432 env[1734]: time="2025-05-17T00:36:12.449377302Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:12.452367 env[1734]: time="2025-05-17T00:36:12.452298526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:12.456517 env[1734]: time="2025-05-17T00:36:12.456475639Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:12.475180 env[1734]: time="2025-05-17T00:36:12.475095232Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:12.475377 env[1734]: time="2025-05-17T00:36:12.475141041Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:12.475377 env[1734]: time="2025-05-17T00:36:12.475156137Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:12.475377 env[1734]: time="2025-05-17T00:36:12.475324444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7c35b4cab832132733043658f98cac68304d838ccaab9c754cf7c1f981093d65 pid=2184 runtime=io.containerd.runc.v2 May 17 00:36:12.487231 env[1734]: time="2025-05-17T00:36:12.487136395Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:12.487488 env[1734]: time="2025-05-17T00:36:12.487455736Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:12.487602 env[1734]: time="2025-05-17T00:36:12.487579556Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:12.487946 env[1734]: time="2025-05-17T00:36:12.487865445Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/79be257dddd2dc6901aa7e7727e333e8c1b32950df5b07c2c02b64540c95a3f7 pid=2201 runtime=io.containerd.runc.v2 May 17 00:36:12.494396 systemd[1]: Started cri-containerd-7c35b4cab832132733043658f98cac68304d838ccaab9c754cf7c1f981093d65.scope. May 17 00:36:12.517848 systemd[1]: Started cri-containerd-79be257dddd2dc6901aa7e7727e333e8c1b32950df5b07c2c02b64540c95a3f7.scope. May 17 00:36:12.531369 kernel: kauditd_printk_skb: 276 callbacks suppressed May 17 00:36:12.531533 kernel: audit: type=1400 audit(1747442172.522:468): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.540994 kernel: audit: type=1400 audit(1747442172.522:469): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.549995 kernel: audit: type=1400 audit(1747442172.522:470): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.556926 kernel: audit: type=1400 audit(1747442172.522:471): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.565981 kernel: audit: type=1400 audit(1747442172.522:472): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.575366 env[1734]: time="2025-05-17T00:36:12.575319460Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zb7kk,Uid:50c31ba8-d3dd-42e9-81e0-5c396cfbaff6,Namespace:calico-system,Attempt:0,} returns sandbox id \"7c35b4cab832132733043658f98cac68304d838ccaab9c754cf7c1f981093d65\"" May 17 00:36:12.577738 kernel: audit: type=1400 audit(1747442172.522:473): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.593864 kernel: audit: type=1400 audit(1747442172.522:474): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.593987 kernel: audit: type=1400 audit(1747442172.522:475): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.594019 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:36:12.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.594148 env[1734]: time="2025-05-17T00:36:12.588737799Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:36:12.600927 kernel: audit: type=1400 audit(1747442172.522:476): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.531000 audit: BPF prog-id=67 op=LOAD May 17 00:36:12.532000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2184 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763333562346361623833323133323733333034333635386639386361 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2184 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763333562346361623833323133323733333034333635386639386361 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit: BPF prog-id=68 op=LOAD May 17 00:36:12.532000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185cc0 items=0 ppid=2184 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763333562346361623833323133323733333034333635386639386361 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.532000 audit: BPF prog-id=69 op=LOAD May 17 00:36:12.532000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185d08 items=0 ppid=2184 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763333562346361623833323133323733333034333635386639386361 May 17 00:36:12.533000 audit: BPF prog-id=69 op=UNLOAD May 17 00:36:12.533000 audit: BPF prog-id=68 op=UNLOAD May 17 00:36:12.533000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.533000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.533000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.533000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.533000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.533000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.533000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.533000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.533000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.533000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.533000 audit: BPF prog-id=70 op=LOAD May 17 00:36:12.533000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c0118 items=0 ppid=2184 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763333562346361623833323133323733333034333635386639386361 May 17 00:36:12.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.586000 audit: BPF prog-id=71 op=LOAD May 17 00:36:12.595000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.595000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2201 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626532353764646464326463363930316161376537373237653333 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit: BPF prog-id=72 op=LOAD May 17 00:36:12.602000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185c70 items=0 ppid=2201 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626532353764646464326463363930316161376537373237653333 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit: BPF prog-id=73 op=LOAD May 17 00:36:12.602000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185cb8 items=0 ppid=2201 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626532353764646464326463363930316161376537373237653333 May 17 00:36:12.602000 audit: BPF prog-id=73 op=UNLOAD May 17 00:36:12.602000 audit: BPF prog-id=72 op=UNLOAD May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.602000 audit: BPF prog-id=74 op=LOAD May 17 00:36:12.602000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c20c8 items=0 ppid=2201 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626532353764646464326463363930316161376537373237653333 May 17 00:36:12.606648 kubelet[2125]: E0517 00:36:12.602247 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:12.620639 env[1734]: time="2025-05-17T00:36:12.620336699Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xnj6s,Uid:74a13e61-b1ee-4348-9c09-b2821a56e2ec,Namespace:kube-system,Attempt:0,} returns sandbox id \"79be257dddd2dc6901aa7e7727e333e8c1b32950df5b07c2c02b64540c95a3f7\"" May 17 00:36:12.757236 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1254709408.mount: Deactivated successfully. May 17 00:36:13.603371 kubelet[2125]: E0517 00:36:13.603321 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:13.682455 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3548968875.mount: Deactivated successfully. May 17 00:36:13.801000 env[1734]: time="2025-05-17T00:36:13.800937545Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:13.803206 env[1734]: time="2025-05-17T00:36:13.803162635Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:13.804836 env[1734]: time="2025-05-17T00:36:13.804801893Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:13.806173 env[1734]: time="2025-05-17T00:36:13.806139927Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:13.806765 env[1734]: time="2025-05-17T00:36:13.806730559Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:36:13.809168 env[1734]: time="2025-05-17T00:36:13.809128137Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\"" May 17 00:36:13.809487 env[1734]: time="2025-05-17T00:36:13.809448776Z" level=info msg="CreateContainer within sandbox \"7c35b4cab832132733043658f98cac68304d838ccaab9c754cf7c1f981093d65\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:36:13.823841 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3580629262.mount: Deactivated successfully. May 17 00:36:13.830112 env[1734]: time="2025-05-17T00:36:13.830068923Z" level=info msg="CreateContainer within sandbox \"7c35b4cab832132733043658f98cac68304d838ccaab9c754cf7c1f981093d65\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"74f2f8ff651f9197910f23c1a61f8c964c7e0390c5519ff1c0f29c3aa1fdb182\"" May 17 00:36:13.831017 env[1734]: time="2025-05-17T00:36:13.830956913Z" level=info msg="StartContainer for \"74f2f8ff651f9197910f23c1a61f8c964c7e0390c5519ff1c0f29c3aa1fdb182\"" May 17 00:36:13.849660 kubelet[2125]: E0517 00:36:13.849612 2125 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rxhbw" podUID="d1b15cac-f557-4eeb-9187-ac2f4bb11e6e" May 17 00:36:13.858553 systemd[1]: Started cri-containerd-74f2f8ff651f9197910f23c1a61f8c964c7e0390c5519ff1c0f29c3aa1fdb182.scope. May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f6aacca5988 items=0 ppid=2184 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:13.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734663266386666363531663931393739313066323363316136316638 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit: BPF prog-id=75 op=LOAD May 17 00:36:13.871000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00010a848 items=0 ppid=2184 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:13.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734663266386666363531663931393739313066323363316136316638 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit: BPF prog-id=76 op=LOAD May 17 00:36:13.871000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00010a898 items=0 ppid=2184 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:13.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734663266386666363531663931393739313066323363316136316638 May 17 00:36:13.871000 audit: BPF prog-id=76 op=UNLOAD May 17 00:36:13.871000 audit: BPF prog-id=75 op=UNLOAD May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.871000 audit: BPF prog-id=77 op=LOAD May 17 00:36:13.871000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00010a928 items=0 ppid=2184 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:13.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734663266386666363531663931393739313066323363316136316638 May 17 00:36:13.888919 env[1734]: time="2025-05-17T00:36:13.888851473Z" level=info msg="StartContainer for \"74f2f8ff651f9197910f23c1a61f8c964c7e0390c5519ff1c0f29c3aa1fdb182\" returns successfully" May 17 00:36:13.900217 systemd[1]: cri-containerd-74f2f8ff651f9197910f23c1a61f8c964c7e0390c5519ff1c0f29c3aa1fdb182.scope: Deactivated successfully. May 17 00:36:13.902000 audit: BPF prog-id=77 op=UNLOAD May 17 00:36:13.921632 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-74f2f8ff651f9197910f23c1a61f8c964c7e0390c5519ff1c0f29c3aa1fdb182-rootfs.mount: Deactivated successfully. May 17 00:36:13.969576 env[1734]: time="2025-05-17T00:36:13.969517995Z" level=info msg="shim disconnected" id=74f2f8ff651f9197910f23c1a61f8c964c7e0390c5519ff1c0f29c3aa1fdb182 May 17 00:36:13.969882 env[1734]: time="2025-05-17T00:36:13.969800190Z" level=warning msg="cleaning up after shim disconnected" id=74f2f8ff651f9197910f23c1a61f8c964c7e0390c5519ff1c0f29c3aa1fdb182 namespace=k8s.io May 17 00:36:13.969882 env[1734]: time="2025-05-17T00:36:13.969823222Z" level=info msg="cleaning up dead shim" May 17 00:36:13.979140 env[1734]: time="2025-05-17T00:36:13.979093792Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:36:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2308 runtime=io.containerd.runc.v2\n" May 17 00:36:14.604150 kubelet[2125]: E0517 00:36:14.604052 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:15.032822 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1110378853.mount: Deactivated successfully. May 17 00:36:15.106588 amazon-ssm-agent[1758]: 2025-05-17 00:36:15 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. May 17 00:36:15.604667 kubelet[2125]: E0517 00:36:15.604605 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:15.734185 env[1734]: time="2025-05-17T00:36:15.734127597Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:15.736588 env[1734]: time="2025-05-17T00:36:15.736539237Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:15.738164 env[1734]: time="2025-05-17T00:36:15.738126477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:15.739873 env[1734]: time="2025-05-17T00:36:15.739833782Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fdf026cf2434537e499e9c739d189ca8fc57101d929ac5ccd8e24f979a9738c1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:15.740188 env[1734]: time="2025-05-17T00:36:15.740156902Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\" returns image reference \"sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578\"" May 17 00:36:15.741519 env[1734]: time="2025-05-17T00:36:15.741496039Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:36:15.742767 env[1734]: time="2025-05-17T00:36:15.742735791Z" level=info msg="CreateContainer within sandbox \"79be257dddd2dc6901aa7e7727e333e8c1b32950df5b07c2c02b64540c95a3f7\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:36:15.761745 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount484790336.mount: Deactivated successfully. May 17 00:36:15.773836 env[1734]: time="2025-05-17T00:36:15.773782688Z" level=info msg="CreateContainer within sandbox \"79be257dddd2dc6901aa7e7727e333e8c1b32950df5b07c2c02b64540c95a3f7\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"69362977ea24b648d0a07138bce8a77ca7916c3d347176441196031fe9f04948\"" May 17 00:36:15.774607 env[1734]: time="2025-05-17T00:36:15.774573709Z" level=info msg="StartContainer for \"69362977ea24b648d0a07138bce8a77ca7916c3d347176441196031fe9f04948\"" May 17 00:36:15.795092 systemd[1]: Started cri-containerd-69362977ea24b648d0a07138bce8a77ca7916c3d347176441196031fe9f04948.scope. May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fab712099f8 items=0 ppid=2201 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333632393737656132346236343864306130373133386263653861 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit: BPF prog-id=78 op=LOAD May 17 00:36:15.815000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022e868 items=0 ppid=2201 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333632393737656132346236343864306130373133386263653861 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit: BPF prog-id=79 op=LOAD May 17 00:36:15.815000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022e8b8 items=0 ppid=2201 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333632393737656132346236343864306130373133386263653861 May 17 00:36:15.815000 audit: BPF prog-id=79 op=UNLOAD May 17 00:36:15.815000 audit: BPF prog-id=78 op=UNLOAD May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.815000 audit: BPF prog-id=80 op=LOAD May 17 00:36:15.815000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022e948 items=0 ppid=2201 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333632393737656132346236343864306130373133386263653861 May 17 00:36:15.823523 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount964163079.mount: Deactivated successfully. May 17 00:36:15.836927 env[1734]: time="2025-05-17T00:36:15.836316032Z" level=info msg="StartContainer for \"69362977ea24b648d0a07138bce8a77ca7916c3d347176441196031fe9f04948\" returns successfully" May 17 00:36:15.849668 kubelet[2125]: E0517 00:36:15.849272 2125 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rxhbw" podUID="d1b15cac-f557-4eeb-9187-ac2f4bb11e6e" May 17 00:36:15.983000 audit[2391]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:15.983000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe229e81d0 a2=0 a3=7ffe229e81bc items=0 ppid=2343 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.983000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:36:15.985000 audit[2392]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:15.985000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe45fe94c0 a2=0 a3=7ffe45fe94ac items=0 ppid=2343 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.985000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:36:15.987000 audit[2393]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:15.987000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe09aef240 a2=0 a3=7ffe09aef22c items=0 ppid=2343 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:36:15.988000 audit[2395]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:15.988000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd02aba830 a2=0 a3=7ffd02aba81c items=0 ppid=2343 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.988000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:36:15.990000 audit[2396]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:15.990000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb691f760 a2=0 a3=7ffcb691f74c items=0 ppid=2343 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:36:15.991000 audit[2397]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:15.991000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2db13530 a2=0 a3=7ffd2db1351c items=0 ppid=2343 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.991000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:36:16.087000 audit[2398]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.087000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdd0ad2be0 a2=0 a3=7ffdd0ad2bcc items=0 ppid=2343 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:36:16.093000 audit[2401]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.093000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe19411fa0 a2=0 a3=7ffe19411f8c items=0 ppid=2343 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:36:16.098000 audit[2404]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.098000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff585c6b00 a2=0 a3=7fff585c6aec items=0 ppid=2343 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:36:16.099000 audit[2405]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.099000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff51590330 a2=0 a3=7fff5159031c items=0 ppid=2343 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:36:16.102000 audit[2407]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.102000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc5c2717c0 a2=0 a3=7ffc5c2717ac items=0 ppid=2343 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:36:16.104000 audit[2408]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.104000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbfc0ed40 a2=0 a3=7ffcbfc0ed2c items=0 ppid=2343 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:36:16.107000 audit[2410]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.107000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff1fbf17c0 a2=0 a3=7fff1fbf17ac items=0 ppid=2343 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:36:16.111000 audit[2413]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.111000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc4ce33820 a2=0 a3=7ffc4ce3380c items=0 ppid=2343 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:36:16.112000 audit[2414]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.112000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf84da200 a2=0 a3=7ffcf84da1ec items=0 ppid=2343 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:36:16.115000 audit[2416]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.115000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1d025f30 a2=0 a3=7ffd1d025f1c items=0 ppid=2343 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:36:16.116000 audit[2417]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.116000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe57cafaa0 a2=0 a3=7ffe57cafa8c items=0 ppid=2343 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:36:16.119000 audit[2419]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.119000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeec915b60 a2=0 a3=7ffeec915b4c items=0 ppid=2343 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:36:16.123000 audit[2422]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.123000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe50c6d750 a2=0 a3=7ffe50c6d73c items=0 ppid=2343 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:36:16.127000 audit[2425]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.127000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca466ccc0 a2=0 a3=7ffca466ccac items=0 ppid=2343 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:36:16.128000 audit[2426]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.128000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc0cbc2f00 a2=0 a3=7ffc0cbc2eec items=0 ppid=2343 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:36:16.131000 audit[2428]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.131000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff4556b9b0 a2=0 a3=7fff4556b99c items=0 ppid=2343 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:36:16.157000 audit[2432]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.157000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff03884470 a2=0 a3=7fff0388445c items=0 ppid=2343 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:36:16.159000 audit[2433]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.159000 audit[2433]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc819257b0 a2=0 a3=7ffc8192579c items=0 ppid=2343 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:36:16.162000 audit[2435]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:16.162000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc496649c0 a2=0 a3=7ffc496649ac items=0 ppid=2343 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:36:16.214000 audit[2441]: NETFILTER_CFG table=filter:39 family=2 entries=7 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:16.214000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffeeb861180 a2=0 a3=7ffeeb86116c items=0 ppid=2343 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:16.240000 audit[2441]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:16.240000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffeeb861180 a2=0 a3=7ffeeb86116c items=0 ppid=2343 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.240000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:16.255000 audit[2451]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2451 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.255000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffd0d20320 a2=0 a3=7fffd0d2030c items=0 ppid=2343 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:36:16.258000 audit[2453]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.258000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdb7ffce20 a2=0 a3=7ffdb7ffce0c items=0 ppid=2343 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:36:16.263000 audit[2456]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2456 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.263000 audit[2456]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd1063fd80 a2=0 a3=7ffd1063fd6c items=0 ppid=2343 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:36:16.264000 audit[2457]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2457 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.264000 audit[2457]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc29b70060 a2=0 a3=7ffc29b7004c items=0 ppid=2343 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:36:16.267000 audit[2459]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.267000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdfc210790 a2=0 a3=7ffdfc21077c items=0 ppid=2343 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:36:16.268000 audit[2460]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.268000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5da2fff0 a2=0 a3=7ffd5da2ffdc items=0 ppid=2343 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.268000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:36:16.271000 audit[2462]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.271000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe899fa280 a2=0 a3=7ffe899fa26c items=0 ppid=2343 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:36:16.275000 audit[2465]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.275000 audit[2465]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffebaf93140 a2=0 a3=7ffebaf9312c items=0 ppid=2343 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:36:16.277000 audit[2466]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.277000 audit[2466]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca6157590 a2=0 a3=7ffca615757c items=0 ppid=2343 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:36:16.280000 audit[2468]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.280000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc4c13020 a2=0 a3=7ffcc4c1300c items=0 ppid=2343 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:36:16.281000 audit[2469]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.281000 audit[2469]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6ce8e9b0 a2=0 a3=7ffc6ce8e99c items=0 ppid=2343 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:36:16.284000 audit[2471]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.284000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2fc1c890 a2=0 a3=7ffd2fc1c87c items=0 ppid=2343 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:36:16.289000 audit[2474]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.289000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9816a0a0 a2=0 a3=7fff9816a08c items=0 ppid=2343 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:36:16.294000 audit[2477]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.294000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1b9d4e10 a2=0 a3=7ffe1b9d4dfc items=0 ppid=2343 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:36:16.296000 audit[2478]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.296000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffde8caa2b0 a2=0 a3=7ffde8caa29c items=0 ppid=2343 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:36:16.299000 audit[2480]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.299000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcd2b4ebf0 a2=0 a3=7ffcd2b4ebdc items=0 ppid=2343 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:36:16.302000 audit[2483]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.302000 audit[2483]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe88b23810 a2=0 a3=7ffe88b237fc items=0 ppid=2343 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:36:16.304000 audit[2484]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.304000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeea2c99e0 a2=0 a3=7ffeea2c99cc items=0 ppid=2343 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:36:16.306000 audit[2486]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.306000 audit[2486]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff74c34850 a2=0 a3=7fff74c3483c items=0 ppid=2343 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:36:16.308000 audit[2487]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.308000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc34be70a0 a2=0 a3=7ffc34be708c items=0 ppid=2343 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:36:16.310000 audit[2489]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.310000 audit[2489]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd608c8c50 a2=0 a3=7ffd608c8c3c items=0 ppid=2343 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:36:16.314000 audit[2492]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:16.314000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff90c58970 a2=0 a3=7fff90c5895c items=0 ppid=2343 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:36:16.318000 audit[2494]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:36:16.318000 audit[2494]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe33e8cc10 a2=0 a3=7ffe33e8cbfc items=0 ppid=2343 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.318000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:16.319000 audit[2494]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:36:16.319000 audit[2494]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe33e8cc10 a2=0 a3=7ffe33e8cbfc items=0 ppid=2343 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.319000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:16.605011 kubelet[2125]: E0517 00:36:16.604877 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:17.605458 kubelet[2125]: E0517 00:36:17.605372 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:17.851455 kubelet[2125]: E0517 00:36:17.850045 2125 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rxhbw" podUID="d1b15cac-f557-4eeb-9187-ac2f4bb11e6e" May 17 00:36:18.606494 kubelet[2125]: E0517 00:36:18.606374 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:18.789796 env[1734]: time="2025-05-17T00:36:18.789747744Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:18.792042 env[1734]: time="2025-05-17T00:36:18.791995740Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:18.793671 env[1734]: time="2025-05-17T00:36:18.793636136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:18.795628 env[1734]: time="2025-05-17T00:36:18.795581514Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:18.796274 env[1734]: time="2025-05-17T00:36:18.795969029Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:36:18.798965 env[1734]: time="2025-05-17T00:36:18.798918009Z" level=info msg="CreateContainer within sandbox \"7c35b4cab832132733043658f98cac68304d838ccaab9c754cf7c1f981093d65\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:36:18.815789 env[1734]: time="2025-05-17T00:36:18.815715046Z" level=info msg="CreateContainer within sandbox \"7c35b4cab832132733043658f98cac68304d838ccaab9c754cf7c1f981093d65\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3620b9a1d63a9f0698cd285a23eb368915fb8c0b8938615d9a4a2e2f1d690e7b\"" May 17 00:36:18.816588 env[1734]: time="2025-05-17T00:36:18.816511318Z" level=info msg="StartContainer for \"3620b9a1d63a9f0698cd285a23eb368915fb8c0b8938615d9a4a2e2f1d690e7b\"" May 17 00:36:18.845852 systemd[1]: run-containerd-runc-k8s.io-3620b9a1d63a9f0698cd285a23eb368915fb8c0b8938615d9a4a2e2f1d690e7b-runc.efR3rz.mount: Deactivated successfully. May 17 00:36:18.848720 systemd[1]: Started cri-containerd-3620b9a1d63a9f0698cd285a23eb368915fb8c0b8938615d9a4a2e2f1d690e7b.scope. May 17 00:36:18.875084 kernel: kauditd_printk_skb: 344 callbacks suppressed May 17 00:36:18.875312 kernel: audit: type=1400 audit(1747442178.865:567): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.865000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.865000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7ff3946cb9e8 items=0 ppid=2184 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:18.887008 kernel: audit: type=1300 audit(1747442178.865:567): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7ff3946cb9e8 items=0 ppid=2184 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:18.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336323062396131643633613966303639386364323835613233656233 May 17 00:36:18.902135 kernel: audit: type=1327 audit(1747442178.865:567): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336323062396131643633613966303639386364323835613233656233 May 17 00:36:18.902260 kernel: audit: type=1400 audit(1747442178.865:568): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.865000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.865000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.911016 kernel: audit: type=1400 audit(1747442178.865:568): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.865000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.920050 kernel: audit: type=1400 audit(1747442178.865:568): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.865000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.933122 kernel: audit: type=1400 audit(1747442178.865:568): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.933245 kernel: audit: type=1400 audit(1747442178.865:568): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.865000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.933327 env[1734]: time="2025-05-17T00:36:18.926982301Z" level=info msg="StartContainer for \"3620b9a1d63a9f0698cd285a23eb368915fb8c0b8938615d9a4a2e2f1d690e7b\" returns successfully" May 17 00:36:18.865000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.941924 kernel: audit: type=1400 audit(1747442178.865:568): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.865000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.950012 kernel: audit: type=1400 audit(1747442178.865:568): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.865000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.865000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.865000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.865000 audit: BPF prog-id=81 op=LOAD May 17 00:36:18.865000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0003944a8 items=0 ppid=2184 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:18.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336323062396131643633613966303639386364323835613233656233 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit: BPF prog-id=82 op=LOAD May 17 00:36:18.874000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003944f8 items=0 ppid=2184 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:18.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336323062396131643633613966303639386364323835613233656233 May 17 00:36:18.874000 audit: BPF prog-id=82 op=UNLOAD May 17 00:36:18.874000 audit: BPF prog-id=81 op=UNLOAD May 17 00:36:18.874000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:18.874000 audit: BPF prog-id=83 op=LOAD May 17 00:36:18.874000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000394588 items=0 ppid=2184 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:18.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336323062396131643633613966303639386364323835613233656233 May 17 00:36:19.559196 env[1734]: time="2025-05-17T00:36:19.559116783Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:36:19.561174 systemd[1]: cri-containerd-3620b9a1d63a9f0698cd285a23eb368915fb8c0b8938615d9a4a2e2f1d690e7b.scope: Deactivated successfully. May 17 00:36:19.565000 audit: BPF prog-id=83 op=UNLOAD May 17 00:36:19.569826 kubelet[2125]: I0517 00:36:19.569023 2125 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 17 00:36:19.586509 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3620b9a1d63a9f0698cd285a23eb368915fb8c0b8938615d9a4a2e2f1d690e7b-rootfs.mount: Deactivated successfully. May 17 00:36:19.607347 kubelet[2125]: E0517 00:36:19.607280 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:19.855791 systemd[1]: Created slice kubepods-besteffort-podd1b15cac_f557_4eeb_9187_ac2f4bb11e6e.slice. May 17 00:36:19.859668 env[1734]: time="2025-05-17T00:36:19.859626657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rxhbw,Uid:d1b15cac-f557-4eeb-9187-ac2f4bb11e6e,Namespace:calico-system,Attempt:0,}" May 17 00:36:19.918926 kubelet[2125]: I0517 00:36:19.918834 2125 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-xnj6s" podStartSLOduration=7.798991966 podStartE2EDuration="10.918810216s" podCreationTimestamp="2025-05-17 00:36:09 +0000 UTC" firstStartedPulling="2025-05-17 00:36:12.62144163 +0000 UTC m=+3.571257162" lastFinishedPulling="2025-05-17 00:36:15.741259881 +0000 UTC m=+6.691075412" observedRunningTime="2025-05-17 00:36:15.892256523 +0000 UTC m=+6.842072077" watchObservedRunningTime="2025-05-17 00:36:19.918810216 +0000 UTC m=+10.868625769" May 17 00:36:20.003000 audit[2546]: NETFILTER_CFG table=filter:65 family=2 entries=12 op=nft_register_rule pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:20.003000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffca46adc80 a2=0 a3=7ffca46adc6c items=0 ppid=2343 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:20.003000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:20.008000 audit[2546]: NETFILTER_CFG table=nat:66 family=2 entries=22 op=nft_register_rule pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:20.008000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffca46adc80 a2=0 a3=7ffca46adc6c items=0 ppid=2343 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:20.008000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:20.139949 env[1734]: time="2025-05-17T00:36:20.139506162Z" level=info msg="shim disconnected" id=3620b9a1d63a9f0698cd285a23eb368915fb8c0b8938615d9a4a2e2f1d690e7b May 17 00:36:20.139949 env[1734]: time="2025-05-17T00:36:20.139549400Z" level=warning msg="cleaning up after shim disconnected" id=3620b9a1d63a9f0698cd285a23eb368915fb8c0b8938615d9a4a2e2f1d690e7b namespace=k8s.io May 17 00:36:20.139949 env[1734]: time="2025-05-17T00:36:20.139558805Z" level=info msg="cleaning up dead shim" May 17 00:36:20.155357 env[1734]: time="2025-05-17T00:36:20.155308476Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:36:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2547 runtime=io.containerd.runc.v2\n" May 17 00:36:20.205017 env[1734]: time="2025-05-17T00:36:20.204941518Z" level=error msg="Failed to destroy network for sandbox \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:20.207050 env[1734]: time="2025-05-17T00:36:20.205354171Z" level=error msg="encountered an error cleaning up failed sandbox \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:20.207050 env[1734]: time="2025-05-17T00:36:20.205414228Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rxhbw,Uid:d1b15cac-f557-4eeb-9187-ac2f4bb11e6e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:20.207191 kubelet[2125]: E0517 00:36:20.205654 2125 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:20.207191 kubelet[2125]: E0517 00:36:20.205733 2125 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rxhbw" May 17 00:36:20.207191 kubelet[2125]: E0517 00:36:20.205769 2125 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rxhbw" May 17 00:36:20.207082 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2-shm.mount: Deactivated successfully. May 17 00:36:20.207426 kubelet[2125]: E0517 00:36:20.205825 2125 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-rxhbw_calico-system(d1b15cac-f557-4eeb-9187-ac2f4bb11e6e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-rxhbw_calico-system(d1b15cac-f557-4eeb-9187-ac2f4bb11e6e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rxhbw" podUID="d1b15cac-f557-4eeb-9187-ac2f4bb11e6e" May 17 00:36:20.608390 kubelet[2125]: E0517 00:36:20.608335 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:20.891239 env[1734]: time="2025-05-17T00:36:20.891121215Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:36:20.891798 kubelet[2125]: I0517 00:36:20.891704 2125 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:36:20.892431 env[1734]: time="2025-05-17T00:36:20.892387295Z" level=info msg="StopPodSandbox for \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\"" May 17 00:36:20.922056 env[1734]: time="2025-05-17T00:36:20.921993584Z" level=error msg="StopPodSandbox for \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\" failed" error="failed to destroy network for sandbox \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:20.922552 kubelet[2125]: E0517 00:36:20.922514 2125 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:36:20.922675 kubelet[2125]: E0517 00:36:20.922574 2125 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2"} May 17 00:36:20.922675 kubelet[2125]: E0517 00:36:20.922646 2125 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d1b15cac-f557-4eeb-9187-ac2f4bb11e6e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:36:20.922802 kubelet[2125]: E0517 00:36:20.922676 2125 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d1b15cac-f557-4eeb-9187-ac2f4bb11e6e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rxhbw" podUID="d1b15cac-f557-4eeb-9187-ac2f4bb11e6e" May 17 00:36:21.311481 systemd[1]: Created slice kubepods-besteffort-podb2a1e976_fca1_42ec_84b2_9d024b97e985.slice. May 17 00:36:21.320024 kubelet[2125]: I0517 00:36:21.319981 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9hp2s\" (UniqueName: \"kubernetes.io/projected/b2a1e976-fca1-42ec-84b2-9d024b97e985-kube-api-access-9hp2s\") pod \"nginx-deployment-8587fbcb89-6szrw\" (UID: \"b2a1e976-fca1-42ec-84b2-9d024b97e985\") " pod="default/nginx-deployment-8587fbcb89-6szrw" May 17 00:36:21.608896 kubelet[2125]: E0517 00:36:21.608855 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:21.616694 env[1734]: time="2025-05-17T00:36:21.616646787Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-6szrw,Uid:b2a1e976-fca1-42ec-84b2-9d024b97e985,Namespace:default,Attempt:0,}" May 17 00:36:21.686583 env[1734]: time="2025-05-17T00:36:21.686519270Z" level=error msg="Failed to destroy network for sandbox \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:21.688770 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70-shm.mount: Deactivated successfully. May 17 00:36:21.690097 env[1734]: time="2025-05-17T00:36:21.690041618Z" level=error msg="encountered an error cleaning up failed sandbox \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:21.690231 env[1734]: time="2025-05-17T00:36:21.690119222Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-6szrw,Uid:b2a1e976-fca1-42ec-84b2-9d024b97e985,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:21.690479 kubelet[2125]: E0517 00:36:21.690441 2125 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:21.690574 kubelet[2125]: E0517 00:36:21.690518 2125 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-6szrw" May 17 00:36:21.690574 kubelet[2125]: E0517 00:36:21.690545 2125 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-6szrw" May 17 00:36:21.690668 kubelet[2125]: E0517 00:36:21.690618 2125 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-6szrw_default(b2a1e976-fca1-42ec-84b2-9d024b97e985)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-6szrw_default(b2a1e976-fca1-42ec-84b2-9d024b97e985)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-6szrw" podUID="b2a1e976-fca1-42ec-84b2-9d024b97e985" May 17 00:36:21.898445 kubelet[2125]: I0517 00:36:21.897348 2125 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:36:21.898589 env[1734]: time="2025-05-17T00:36:21.898101035Z" level=info msg="StopPodSandbox for \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\"" May 17 00:36:21.961372 env[1734]: time="2025-05-17T00:36:21.961307303Z" level=error msg="StopPodSandbox for \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\" failed" error="failed to destroy network for sandbox \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:21.961980 kubelet[2125]: E0517 00:36:21.961768 2125 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:36:21.961980 kubelet[2125]: E0517 00:36:21.961828 2125 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70"} May 17 00:36:21.961980 kubelet[2125]: E0517 00:36:21.961874 2125 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b2a1e976-fca1-42ec-84b2-9d024b97e985\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:36:21.961980 kubelet[2125]: E0517 00:36:21.961932 2125 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b2a1e976-fca1-42ec-84b2-9d024b97e985\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-6szrw" podUID="b2a1e976-fca1-42ec-84b2-9d024b97e985" May 17 00:36:22.609949 kubelet[2125]: E0517 00:36:22.609866 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:23.610179 kubelet[2125]: E0517 00:36:23.610107 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:24.611233 kubelet[2125]: E0517 00:36:24.611159 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:25.612320 kubelet[2125]: E0517 00:36:25.612275 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:26.613265 kubelet[2125]: E0517 00:36:26.613222 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:26.965024 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount236263105.mount: Deactivated successfully. May 17 00:36:27.000801 env[1734]: time="2025-05-17T00:36:27.000739185Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:27.003195 env[1734]: time="2025-05-17T00:36:27.003145678Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:27.004645 env[1734]: time="2025-05-17T00:36:27.004610345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:27.006971 env[1734]: time="2025-05-17T00:36:27.006929557Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:27.007506 env[1734]: time="2025-05-17T00:36:27.007461967Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:36:27.027681 env[1734]: time="2025-05-17T00:36:27.027640438Z" level=info msg="CreateContainer within sandbox \"7c35b4cab832132733043658f98cac68304d838ccaab9c754cf7c1f981093d65\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:36:27.044933 env[1734]: time="2025-05-17T00:36:27.044790537Z" level=info msg="CreateContainer within sandbox \"7c35b4cab832132733043658f98cac68304d838ccaab9c754cf7c1f981093d65\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4e77743d1a39d026a80ea5e8eb8aab2766c220223aaec3e34c551c16152f32d6\"" May 17 00:36:27.045550 env[1734]: time="2025-05-17T00:36:27.045509553Z" level=info msg="StartContainer for \"4e77743d1a39d026a80ea5e8eb8aab2766c220223aaec3e34c551c16152f32d6\"" May 17 00:36:27.078104 systemd[1]: Started cri-containerd-4e77743d1a39d026a80ea5e8eb8aab2766c220223aaec3e34c551c16152f32d6.scope. May 17 00:36:27.121048 kernel: kauditd_printk_skb: 40 callbacks suppressed May 17 00:36:27.121218 kernel: audit: type=1400 audit(1747442187.112:576): avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f57758c25b8 items=0 ppid=2184 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.138244 kernel: audit: type=1300 audit(1747442187.112:576): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f57758c25b8 items=0 ppid=2184 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.138418 kernel: audit: type=1327 audit(1747442187.112:576): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465373737343364316133396430323661383065613565386562386161 May 17 00:36:27.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465373737343364316133396430323661383065613565386562386161 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.145917 kernel: audit: type=1400 audit(1747442187.112:577): avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.159805 kernel: audit: type=1400 audit(1747442187.112:577): avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.159955 kernel: audit: type=1400 audit(1747442187.112:577): avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.167339 env[1734]: time="2025-05-17T00:36:27.167282823Z" level=info msg="StartContainer for \"4e77743d1a39d026a80ea5e8eb8aab2766c220223aaec3e34c551c16152f32d6\" returns successfully" May 17 00:36:27.168446 kernel: audit: type=1400 audit(1747442187.112:577): avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.168535 kernel: audit: type=1400 audit(1747442187.112:577): avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.182768 kernel: audit: type=1400 audit(1747442187.112:577): avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.182931 kernel: audit: type=1400 audit(1747442187.112:577): avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit: BPF prog-id=84 op=LOAD May 17 00:36:27.112000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002e5eb8 items=0 ppid=2184 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465373737343364316133396430323661383065613565386562386161 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit: BPF prog-id=85 op=LOAD May 17 00:36:27.112000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002e5f08 items=0 ppid=2184 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465373737343364316133396430323661383065613565386562386161 May 17 00:36:27.112000 audit: BPF prog-id=85 op=UNLOAD May 17 00:36:27.112000 audit: BPF prog-id=84 op=UNLOAD May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:27.112000 audit: BPF prog-id=86 op=LOAD May 17 00:36:27.112000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002e5f98 items=0 ppid=2184 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465373737343364316133396430323661383065613565386562386161 May 17 00:36:27.357218 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:36:27.357378 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:36:27.613726 kubelet[2125]: E0517 00:36:27.613669 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:27.932518 kubelet[2125]: I0517 00:36:27.932373 2125 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-zb7kk" podStartSLOduration=4.504026541 podStartE2EDuration="18.932357603s" podCreationTimestamp="2025-05-17 00:36:09 +0000 UTC" firstStartedPulling="2025-05-17 00:36:12.580515411 +0000 UTC m=+3.530330943" lastFinishedPulling="2025-05-17 00:36:27.008846457 +0000 UTC m=+17.958662005" observedRunningTime="2025-05-17 00:36:27.931065239 +0000 UTC m=+18.880880793" watchObservedRunningTime="2025-05-17 00:36:27.932357603 +0000 UTC m=+18.882173155" May 17 00:36:28.614582 kubelet[2125]: E0517 00:36:28.614532 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:28.689000 audit[2771]: AVC avc: denied { write } for pid=2771 comm="tee" name="fd" dev="proc" ino=20153 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:28.689000 audit[2771]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffef1ce7dd a2=241 a3=1b6 items=1 ppid=2745 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.689000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:36:28.689000 audit: PATH item=0 name="/dev/fd/63" inode=19163 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:28.689000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:28.691000 audit[2776]: AVC avc: denied { write } for pid=2776 comm="tee" name="fd" dev="proc" ino=19175 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:28.693000 audit[2779]: AVC avc: denied { write } for pid=2779 comm="tee" name="fd" dev="proc" ino=20158 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:28.693000 audit[2779]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5352c7ec a2=241 a3=1b6 items=1 ppid=2749 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.693000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:36:28.693000 audit: PATH item=0 name="/dev/fd/63" inode=19169 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:28.693000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:28.699000 audit[2783]: AVC avc: denied { write } for pid=2783 comm="tee" name="fd" dev="proc" ino=19182 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:28.700000 audit[2786]: AVC avc: denied { write } for pid=2786 comm="tee" name="fd" dev="proc" ino=19185 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:28.702000 audit[2788]: AVC avc: denied { write } for pid=2788 comm="tee" name="fd" dev="proc" ino=20164 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:28.702000 audit[2788]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc73d427dc a2=241 a3=1b6 items=1 ppid=2747 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.702000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:36:28.702000 audit: PATH item=0 name="/dev/fd/63" inode=20150 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:28.702000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:28.691000 audit[2776]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff347eb7ec a2=241 a3=1b6 items=1 ppid=2742 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.691000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:36:28.691000 audit: PATH item=0 name="/dev/fd/63" inode=19166 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:28.691000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:28.700000 audit[2786]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcfe31d7ed a2=241 a3=1b6 items=1 ppid=2738 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.699000 audit[2783]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9b0ad7ee a2=241 a3=1b6 items=1 ppid=2737 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.700000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:36:28.700000 audit: PATH item=0 name="/dev/fd/63" inode=20149 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:28.700000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:28.699000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:36:28.699000 audit: PATH item=0 name="/dev/fd/63" inode=20146 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:28.699000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:28.708000 audit[2806]: AVC avc: denied { write } for pid=2806 comm="tee" name="fd" dev="proc" ino=19192 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:28.708000 audit[2806]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc7f5c7ec a2=241 a3=1b6 items=1 ppid=2754 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.708000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:36:28.708000 audit: PATH item=0 name="/dev/fd/63" inode=19178 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:28.708000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:28.930232 systemd[1]: run-containerd-runc-k8s.io-4e77743d1a39d026a80ea5e8eb8aab2766c220223aaec3e34c551c16152f32d6-runc.47BVd2.mount: Deactivated successfully. May 17 00:36:28.944000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit: BPF prog-id=87 op=LOAD May 17 00:36:28.944000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef523f490 a2=98 a3=3 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.944000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:28.944000 audit: BPF prog-id=87 op=UNLOAD May 17 00:36:28.944000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit: BPF prog-id=88 op=LOAD May 17 00:36:28.944000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef523f280 a2=94 a3=54428f items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.944000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:28.944000 audit: BPF prog-id=88 op=UNLOAD May 17 00:36:28.944000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.944000 audit: BPF prog-id=89 op=LOAD May 17 00:36:28.944000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef523f2b0 a2=94 a3=2 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.944000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:28.944000 audit: BPF prog-id=89 op=UNLOAD May 17 00:36:29.080000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.080000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.080000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.080000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.080000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.080000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.080000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.080000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.080000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.080000 audit: BPF prog-id=90 op=LOAD May 17 00:36:29.080000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef523f170 a2=94 a3=1 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.080000 audit: BPF prog-id=90 op=UNLOAD May 17 00:36:29.080000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.080000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffef523f240 a2=50 a3=7ffef523f320 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.092000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.092000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef523f180 a2=28 a3=0 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.092000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.092000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef523f1b0 a2=28 a3=0 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.092000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.092000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef523f0c0 a2=28 a3=0 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.092000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.092000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef523f1d0 a2=28 a3=0 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.092000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.092000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef523f1b0 a2=28 a3=0 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.092000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.092000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef523f1a0 a2=28 a3=0 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.092000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.092000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef523f1d0 a2=28 a3=0 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.092000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.092000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef523f1b0 a2=28 a3=0 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.092000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.092000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef523f1d0 a2=28 a3=0 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.092000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.092000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef523f1a0 a2=28 a3=0 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.092000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.092000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef523f210 a2=28 a3=0 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef523efc0 a2=50 a3=1 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.093000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit: BPF prog-id=91 op=LOAD May 17 00:36:29.093000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffef523efc0 a2=94 a3=5 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.093000 audit: BPF prog-id=91 op=UNLOAD May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef523f070 a2=50 a3=1 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.093000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffef523f190 a2=4 a3=38 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.093000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:29.093000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef523f1e0 a2=94 a3=6 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.093000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.093000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:29.093000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef523e990 a2=94 a3=88 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.094000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.094000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.094000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.094000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.094000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.094000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.094000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.094000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.094000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.094000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.094000 audit[2828]: AVC avc: denied { confidentiality } for pid=2828 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:29.094000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef523e990 a2=94 a3=88 items=0 ppid=2750 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.094000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:29.104000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit: BPF prog-id=92 op=LOAD May 17 00:36:29.104000 audit[2868]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7e9be170 a2=98 a3=1999999999999999 items=0 ppid=2750 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.104000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:36:29.104000 audit: BPF prog-id=92 op=UNLOAD May 17 00:36:29.104000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit: BPF prog-id=93 op=LOAD May 17 00:36:29.104000 audit[2868]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7e9be050 a2=94 a3=ffff items=0 ppid=2750 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.104000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:36:29.104000 audit: BPF prog-id=93 op=UNLOAD May 17 00:36:29.104000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.104000 audit: BPF prog-id=94 op=LOAD May 17 00:36:29.104000 audit[2868]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7e9be090 a2=94 a3=7ffd7e9be270 items=0 ppid=2750 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.104000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:36:29.104000 audit: BPF prog-id=94 op=UNLOAD May 17 00:36:29.179745 systemd-networkd[1460]: vxlan.calico: Link UP May 17 00:36:29.179752 systemd-networkd[1460]: vxlan.calico: Gained carrier May 17 00:36:29.180793 (udev-worker)[2683]: Network interface NamePolicy= disabled on kernel command line. May 17 00:36:29.206872 (udev-worker)[2890]: Network interface NamePolicy= disabled on kernel command line. May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit: BPF prog-id=95 op=LOAD May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff26ba5b30 a2=98 a3=0 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit: BPF prog-id=95 op=UNLOAD May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit: BPF prog-id=96 op=LOAD May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff26ba5940 a2=94 a3=54428f items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit: BPF prog-id=96 op=UNLOAD May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit: BPF prog-id=97 op=LOAD May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff26ba5970 a2=94 a3=2 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit: BPF prog-id=97 op=UNLOAD May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff26ba5840 a2=28 a3=0 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff26ba5870 a2=28 a3=0 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff26ba5780 a2=28 a3=0 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff26ba5890 a2=28 a3=0 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff26ba5870 a2=28 a3=0 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff26ba5860 a2=28 a3=0 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff26ba5890 a2=28 a3=0 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff26ba5870 a2=28 a3=0 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff26ba5890 a2=28 a3=0 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff26ba5860 a2=28 a3=0 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff26ba58d0 a2=28 a3=0 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.212000 audit: BPF prog-id=98 op=LOAD May 17 00:36:29.212000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff26ba5740 a2=94 a3=0 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.212000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.213000 audit: BPF prog-id=98 op=UNLOAD May 17 00:36:29.213000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.213000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff26ba5730 a2=50 a3=2800 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.213000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.213000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.213000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff26ba5730 a2=50 a3=2800 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.213000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit: BPF prog-id=99 op=LOAD May 17 00:36:29.214000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff26ba4f50 a2=94 a3=2 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.214000 audit: BPF prog-id=99 op=UNLOAD May 17 00:36:29.214000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { perfmon } for pid=2895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit[2895]: AVC avc: denied { bpf } for pid=2895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.214000 audit: BPF prog-id=100 op=LOAD May 17 00:36:29.214000 audit[2895]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff26ba5050 a2=94 a3=30 items=0 ppid=2750 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:29.220000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.220000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.220000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.220000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.220000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.220000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.220000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.220000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.220000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.220000 audit: BPF prog-id=101 op=LOAD May 17 00:36:29.220000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffda0153a20 a2=98 a3=0 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.220000 audit: BPF prog-id=101 op=UNLOAD May 17 00:36:29.221000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit: BPF prog-id=102 op=LOAD May 17 00:36:29.221000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda0153810 a2=94 a3=54428f items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.221000 audit: BPF prog-id=102 op=UNLOAD May 17 00:36:29.221000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.221000 audit: BPF prog-id=103 op=LOAD May 17 00:36:29.221000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda0153840 a2=94 a3=2 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.221000 audit: BPF prog-id=103 op=UNLOAD May 17 00:36:29.353000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.353000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.353000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.353000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.353000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.353000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.353000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.353000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.353000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.353000 audit: BPF prog-id=104 op=LOAD May 17 00:36:29.353000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda0153700 a2=94 a3=1 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.353000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.353000 audit: BPF prog-id=104 op=UNLOAD May 17 00:36:29.353000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.353000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffda01537d0 a2=50 a3=7ffda01538b0 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.353000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.364000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.364000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda0153710 a2=28 a3=0 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.364000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.364000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda0153740 a2=28 a3=0 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.364000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.364000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda0153650 a2=28 a3=0 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.364000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.364000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda0153760 a2=28 a3=0 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.364000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.364000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda0153740 a2=28 a3=0 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.364000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.364000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda0153730 a2=28 a3=0 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.364000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.364000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda0153760 a2=28 a3=0 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.364000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.364000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda0153740 a2=28 a3=0 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.364000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda0153760 a2=28 a3=0 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.365000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda0153730 a2=28 a3=0 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.365000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda01537a0 a2=28 a3=0 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.365000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffda0153550 a2=50 a3=1 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.365000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit: BPF prog-id=105 op=LOAD May 17 00:36:29.365000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffda0153550 a2=94 a3=5 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.365000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.365000 audit: BPF prog-id=105 op=UNLOAD May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffda0153600 a2=50 a3=1 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.365000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffda0153720 a2=4 a3=38 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.365000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:29.365000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda0153770 a2=94 a3=6 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.365000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.365000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:29.365000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda0152f20 a2=94 a3=88 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.365000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.366000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.366000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.366000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.366000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.366000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.366000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.366000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.366000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.366000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffda0152f20 a2=94 a3=88 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.366000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.366000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.366000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda0154950 a2=10 a3=f8f00800 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.366000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.367000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.367000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda01547f0 a2=10 a3=3 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.367000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.367000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda0154790 a2=10 a3=3 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.367000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:29.367000 audit[2898]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda0154790 a2=10 a3=7 items=0 ppid=2750 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:29.375000 audit: BPF prog-id=100 op=UNLOAD May 17 00:36:29.454000 audit[2922]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:29.456000 audit[2921]: NETFILTER_CFG table=nat:68 family=2 entries=15 op=nft_register_chain pid=2921 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:29.456000 audit[2921]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffcc5474950 a2=0 a3=7ffcc547493c items=0 ppid=2750 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.456000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:29.454000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffba00dd50 a2=0 a3=7fffba00dd3c items=0 ppid=2750 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.454000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:29.472000 audit[2926]: NETFILTER_CFG table=filter:69 family=2 entries=39 op=nft_register_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:29.472000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffed657ada0 a2=0 a3=7ffed657ad8c items=0 ppid=2750 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.472000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:29.473000 audit[2920]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2920 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:29.473000 audit[2920]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd987df0d0 a2=0 a3=7ffd987df0bc items=0 ppid=2750 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.473000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:29.596114 kubelet[2125]: E0517 00:36:29.596063 2125 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:29.615113 kubelet[2125]: E0517 00:36:29.615071 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:29.942280 systemd[1]: run-containerd-runc-k8s.io-4e77743d1a39d026a80ea5e8eb8aab2766c220223aaec3e34c551c16152f32d6-runc.KgOdvC.mount: Deactivated successfully. May 17 00:36:30.295100 systemd-networkd[1460]: vxlan.calico: Gained IPv6LL May 17 00:36:30.615396 kubelet[2125]: E0517 00:36:30.615344 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:30.987947 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 17 00:36:30.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:31.006000 audit: BPF prog-id=56 op=UNLOAD May 17 00:36:31.006000 audit: BPF prog-id=55 op=UNLOAD May 17 00:36:31.006000 audit: BPF prog-id=54 op=UNLOAD May 17 00:36:31.615559 kubelet[2125]: E0517 00:36:31.615507 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:32.616277 kubelet[2125]: E0517 00:36:32.616222 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:32.850305 env[1734]: time="2025-05-17T00:36:32.850266140Z" level=info msg="StopPodSandbox for \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\"" May 17 00:36:33.616970 kubelet[2125]: E0517 00:36:33.616926 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:33.843609 env[1734]: 2025-05-17 00:36:33.276 [INFO][2967] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:36:33.843609 env[1734]: 2025-05-17 00:36:33.292 [INFO][2967] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" iface="eth0" netns="/var/run/netns/cni-b768e7bb-a3f3-6e59-213d-c6c77d821832" May 17 00:36:33.843609 env[1734]: 2025-05-17 00:36:33.292 [INFO][2967] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" iface="eth0" netns="/var/run/netns/cni-b768e7bb-a3f3-6e59-213d-c6c77d821832" May 17 00:36:33.843609 env[1734]: 2025-05-17 00:36:33.300 [INFO][2967] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" iface="eth0" netns="/var/run/netns/cni-b768e7bb-a3f3-6e59-213d-c6c77d821832" May 17 00:36:33.843609 env[1734]: 2025-05-17 00:36:33.300 [INFO][2967] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:36:33.843609 env[1734]: 2025-05-17 00:36:33.300 [INFO][2967] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:36:33.843609 env[1734]: 2025-05-17 00:36:33.827 [INFO][2974] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" HandleID="k8s-pod-network.b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" Workload="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:36:33.843609 env[1734]: 2025-05-17 00:36:33.827 [INFO][2974] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:33.843609 env[1734]: 2025-05-17 00:36:33.827 [INFO][2974] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:33.843609 env[1734]: 2025-05-17 00:36:33.838 [WARNING][2974] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" HandleID="k8s-pod-network.b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" Workload="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:36:33.843609 env[1734]: 2025-05-17 00:36:33.838 [INFO][2974] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" HandleID="k8s-pod-network.b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" Workload="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:36:33.843609 env[1734]: 2025-05-17 00:36:33.840 [INFO][2974] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:33.843609 env[1734]: 2025-05-17 00:36:33.842 [INFO][2967] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:36:33.847275 env[1734]: time="2025-05-17T00:36:33.845461188Z" level=info msg="TearDown network for sandbox \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\" successfully" May 17 00:36:33.847275 env[1734]: time="2025-05-17T00:36:33.845498600Z" level=info msg="StopPodSandbox for \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\" returns successfully" May 17 00:36:33.847275 env[1734]: time="2025-05-17T00:36:33.846322457Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rxhbw,Uid:d1b15cac-f557-4eeb-9187-ac2f4bb11e6e,Namespace:calico-system,Attempt:1,}" May 17 00:36:33.845543 systemd[1]: run-netns-cni\x2db768e7bb\x2da3f3\x2d6e59\x2d213d\x2dc6c77d821832.mount: Deactivated successfully. May 17 00:36:34.024392 systemd-networkd[1460]: cali6c1dff7500d: Link UP May 17 00:36:34.028689 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:36:34.028813 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6c1dff7500d: link becomes ready May 17 00:36:34.029003 systemd-networkd[1460]: cali6c1dff7500d: Gained carrier May 17 00:36:34.030472 (udev-worker)[3001]: Network interface NamePolicy= disabled on kernel command line. May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:33.906 [INFO][2982] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.24.63-k8s-csi--node--driver--rxhbw-eth0 csi-node-driver- calico-system d1b15cac-f557-4eeb-9187-ac2f4bb11e6e 1251 0 2025-05-17 00:36:09 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:68bf44dd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.24.63 csi-node-driver-rxhbw eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6c1dff7500d [] [] }} ContainerID="9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" Namespace="calico-system" Pod="csi-node-driver-rxhbw" WorkloadEndpoint="172.31.24.63-k8s-csi--node--driver--rxhbw-" May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:33.906 [INFO][2982] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" Namespace="calico-system" Pod="csi-node-driver-rxhbw" WorkloadEndpoint="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:33.938 [INFO][2994] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" HandleID="k8s-pod-network.9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" Workload="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:33.938 [INFO][2994] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" HandleID="k8s-pod-network.9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" Workload="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9020), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.24.63", "pod":"csi-node-driver-rxhbw", "timestamp":"2025-05-17 00:36:33.938475932 +0000 UTC"}, Hostname:"172.31.24.63", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:33.938 [INFO][2994] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:33.938 [INFO][2994] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:33.938 [INFO][2994] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.24.63' May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:33.951 [INFO][2994] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" host="172.31.24.63" May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:33.984 [INFO][2994] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.24.63" May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:33.990 [INFO][2994] ipam/ipam.go 511: Trying affinity for 192.168.88.192/26 host="172.31.24.63" May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:33.992 [INFO][2994] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.192/26 host="172.31.24.63" May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:33.997 [INFO][2994] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.192/26 host="172.31.24.63" May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:33.997 [INFO][2994] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.192/26 handle="k8s-pod-network.9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" host="172.31.24.63" May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:34.002 [INFO][2994] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093 May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:34.008 [INFO][2994] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.192/26 handle="k8s-pod-network.9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" host="172.31.24.63" May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:34.017 [INFO][2994] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.193/26] block=192.168.88.192/26 handle="k8s-pod-network.9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" host="172.31.24.63" May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:34.017 [INFO][2994] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.193/26] handle="k8s-pod-network.9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" host="172.31.24.63" May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:34.017 [INFO][2994] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:34.052473 env[1734]: 2025-05-17 00:36:34.017 [INFO][2994] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.193/26] IPv6=[] ContainerID="9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" HandleID="k8s-pod-network.9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" Workload="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:36:34.053392 env[1734]: 2025-05-17 00:36:34.019 [INFO][2982] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" Namespace="calico-system" Pod="csi-node-driver-rxhbw" WorkloadEndpoint="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.63-k8s-csi--node--driver--rxhbw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d1b15cac-f557-4eeb-9187-ac2f4bb11e6e", ResourceVersion:"1251", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.63", ContainerID:"", Pod:"csi-node-driver-rxhbw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6c1dff7500d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:34.053392 env[1734]: 2025-05-17 00:36:34.019 [INFO][2982] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.193/32] ContainerID="9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" Namespace="calico-system" Pod="csi-node-driver-rxhbw" WorkloadEndpoint="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:36:34.053392 env[1734]: 2025-05-17 00:36:34.019 [INFO][2982] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6c1dff7500d ContainerID="9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" Namespace="calico-system" Pod="csi-node-driver-rxhbw" WorkloadEndpoint="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:36:34.053392 env[1734]: 2025-05-17 00:36:34.029 [INFO][2982] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" Namespace="calico-system" Pod="csi-node-driver-rxhbw" WorkloadEndpoint="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:36:34.053392 env[1734]: 2025-05-17 00:36:34.030 [INFO][2982] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" Namespace="calico-system" Pod="csi-node-driver-rxhbw" WorkloadEndpoint="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.63-k8s-csi--node--driver--rxhbw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d1b15cac-f557-4eeb-9187-ac2f4bb11e6e", ResourceVersion:"1251", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.63", ContainerID:"9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093", Pod:"csi-node-driver-rxhbw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6c1dff7500d", MAC:"2a:5c:0a:53:97:ce", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:34.053392 env[1734]: 2025-05-17 00:36:34.050 [INFO][2982] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093" Namespace="calico-system" Pod="csi-node-driver-rxhbw" WorkloadEndpoint="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:36:34.067719 env[1734]: time="2025-05-17T00:36:34.067647823Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:34.067846 env[1734]: time="2025-05-17T00:36:34.067741572Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:34.067846 env[1734]: time="2025-05-17T00:36:34.067766214Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:34.067987 env[1734]: time="2025-05-17T00:36:34.067952632Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093 pid=3020 runtime=io.containerd.runc.v2 May 17 00:36:34.097406 systemd[1]: Started cri-containerd-9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093.scope. May 17 00:36:34.110224 kernel: kauditd_printk_skb: 558 callbacks suppressed May 17 00:36:34.110359 kernel: audit: type=1325 audit(1747442194.073:688): table=filter:71 family=2 entries=38 op=nft_register_chain pid=3016 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:34.073000 audit[3016]: NETFILTER_CFG table=filter:71 family=2 entries=38 op=nft_register_chain pid=3016 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:34.118482 kernel: audit: type=1300 audit(1747442194.073:688): arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffe6703cd20 a2=0 a3=7ffe6703cd0c items=0 ppid=2750 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:34.073000 audit[3016]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffe6703cd20 a2=0 a3=7ffe6703cd0c items=0 ppid=2750 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:34.131959 kernel: audit: type=1327 audit(1747442194.073:688): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:34.137240 kernel: audit: type=1400 audit(1747442194.119:689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.073000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:34.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.141726 kernel: audit: type=1400 audit(1747442194.119:690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.146922 kernel: audit: type=1400 audit(1747442194.119:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.151500 env[1734]: time="2025-05-17T00:36:34.149112317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rxhbw,Uid:d1b15cac-f557-4eeb-9187-ac2f4bb11e6e,Namespace:calico-system,Attempt:1,} returns sandbox id \"9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093\"" May 17 00:36:34.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.155311 kernel: audit: type=1400 audit(1747442194.119:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.155461 kernel: audit: type=1400 audit(1747442194.119:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.155587 env[1734]: time="2025-05-17T00:36:34.155549025Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:36:34.160669 kernel: audit: type=1400 audit(1747442194.119:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.162958 kernel: audit: type=1400 audit(1747442194.119:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.119000 audit: BPF prog-id=106 op=LOAD May 17 00:36:34.120000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3020 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:34.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376130316539633235316165393863663465363135323664336537 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3020 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:34.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376130316539633235316165393863663465363135323664336537 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit: BPF prog-id=107 op=LOAD May 17 00:36:34.120000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000399820 items=0 ppid=3020 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:34.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376130316539633235316165393863663465363135323664336537 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.120000 audit: BPF prog-id=108 op=LOAD May 17 00:36:34.120000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000399868 items=0 ppid=3020 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:34.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376130316539633235316165393863663465363135323664336537 May 17 00:36:34.121000 audit: BPF prog-id=108 op=UNLOAD May 17 00:36:34.121000 audit: BPF prog-id=107 op=UNLOAD May 17 00:36:34.121000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.121000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.121000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.121000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.121000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.121000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.121000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.121000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.121000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.121000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.121000 audit: BPF prog-id=109 op=LOAD May 17 00:36:34.121000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000399c78 items=0 ppid=3020 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:34.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376130316539633235316165393863663465363135323664336537 May 17 00:36:34.617682 kubelet[2125]: E0517 00:36:34.617624 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:34.845560 systemd[1]: run-containerd-runc-k8s.io-9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093-runc.XRRAVH.mount: Deactivated successfully. May 17 00:36:35.415975 systemd-networkd[1460]: cali6c1dff7500d: Gained IPv6LL May 17 00:36:35.447360 env[1734]: time="2025-05-17T00:36:35.447303408Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:35.449512 env[1734]: time="2025-05-17T00:36:35.449474502Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:35.450925 env[1734]: time="2025-05-17T00:36:35.450865364Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:35.452277 env[1734]: time="2025-05-17T00:36:35.452248750Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:35.452569 env[1734]: time="2025-05-17T00:36:35.452539677Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:36:35.454771 env[1734]: time="2025-05-17T00:36:35.454686259Z" level=info msg="CreateContainer within sandbox \"9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:36:35.473019 env[1734]: time="2025-05-17T00:36:35.472953561Z" level=info msg="CreateContainer within sandbox \"9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3b7027e8363506fd8ba8df661b732191659f375909361eb99f31ae6586252933\"" May 17 00:36:35.473773 env[1734]: time="2025-05-17T00:36:35.473717771Z" level=info msg="StartContainer for \"3b7027e8363506fd8ba8df661b732191659f375909361eb99f31ae6586252933\"" May 17 00:36:35.498340 systemd[1]: Started cri-containerd-3b7027e8363506fd8ba8df661b732191659f375909361eb99f31ae6586252933.scope. May 17 00:36:35.515000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.515000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7f42a60e9a88 items=0 ppid=3020 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:35.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373032376538333633353036666438626138646636363162373332 May 17 00:36:35.515000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.515000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.515000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.515000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.515000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.515000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.515000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.515000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.515000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.515000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.515000 audit: BPF prog-id=110 op=LOAD May 17 00:36:35.515000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c00022cc48 items=0 ppid=3020 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:35.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373032376538333633353036666438626138646636363162373332 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit: BPF prog-id=111 op=LOAD May 17 00:36:35.516000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c00022cc98 items=0 ppid=3020 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:35.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373032376538333633353036666438626138646636363162373332 May 17 00:36:35.516000 audit: BPF prog-id=111 op=UNLOAD May 17 00:36:35.516000 audit: BPF prog-id=110 op=UNLOAD May 17 00:36:35.516000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:35.516000 audit: BPF prog-id=112 op=LOAD May 17 00:36:35.516000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c00022cd28 items=0 ppid=3020 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:35.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373032376538333633353036666438626138646636363162373332 May 17 00:36:35.532677 env[1734]: time="2025-05-17T00:36:35.532637343Z" level=info msg="StartContainer for \"3b7027e8363506fd8ba8df661b732191659f375909361eb99f31ae6586252933\" returns successfully" May 17 00:36:35.535794 env[1734]: time="2025-05-17T00:36:35.535666369Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:36:35.617789 kubelet[2125]: E0517 00:36:35.617737 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:36.618600 kubelet[2125]: E0517 00:36:36.618549 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:36.849979 env[1734]: time="2025-05-17T00:36:36.849935989Z" level=info msg="StopPodSandbox for \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\"" May 17 00:36:36.986866 env[1734]: 2025-05-17 00:36:36.928 [INFO][3109] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:36:36.986866 env[1734]: 2025-05-17 00:36:36.928 [INFO][3109] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" iface="eth0" netns="/var/run/netns/cni-55562ecf-8afd-bea1-3434-8703adb188dc" May 17 00:36:36.986866 env[1734]: 2025-05-17 00:36:36.928 [INFO][3109] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" iface="eth0" netns="/var/run/netns/cni-55562ecf-8afd-bea1-3434-8703adb188dc" May 17 00:36:36.986866 env[1734]: 2025-05-17 00:36:36.928 [INFO][3109] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" iface="eth0" netns="/var/run/netns/cni-55562ecf-8afd-bea1-3434-8703adb188dc" May 17 00:36:36.986866 env[1734]: 2025-05-17 00:36:36.928 [INFO][3109] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:36:36.986866 env[1734]: 2025-05-17 00:36:36.928 [INFO][3109] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:36:36.986866 env[1734]: 2025-05-17 00:36:36.974 [INFO][3116] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" HandleID="k8s-pod-network.bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" Workload="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:36:36.986866 env[1734]: 2025-05-17 00:36:36.974 [INFO][3116] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:36.986866 env[1734]: 2025-05-17 00:36:36.974 [INFO][3116] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:36.986866 env[1734]: 2025-05-17 00:36:36.981 [WARNING][3116] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" HandleID="k8s-pod-network.bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" Workload="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:36:36.986866 env[1734]: 2025-05-17 00:36:36.981 [INFO][3116] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" HandleID="k8s-pod-network.bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" Workload="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:36:36.986866 env[1734]: 2025-05-17 00:36:36.983 [INFO][3116] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:36.986866 env[1734]: 2025-05-17 00:36:36.985 [INFO][3109] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:36:36.992043 systemd[1]: run-netns-cni\x2d55562ecf\x2d8afd\x2dbea1\x2d3434\x2d8703adb188dc.mount: Deactivated successfully. May 17 00:36:36.994240 env[1734]: time="2025-05-17T00:36:36.994189914Z" level=info msg="TearDown network for sandbox \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\" successfully" May 17 00:36:36.994395 env[1734]: time="2025-05-17T00:36:36.994375466Z" level=info msg="StopPodSandbox for \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\" returns successfully" May 17 00:36:36.995206 env[1734]: time="2025-05-17T00:36:36.995172510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-6szrw,Uid:b2a1e976-fca1-42ec-84b2-9d024b97e985,Namespace:default,Attempt:1,}" May 17 00:36:37.232029 env[1734]: time="2025-05-17T00:36:37.231923112Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:37.234550 env[1734]: time="2025-05-17T00:36:37.234248970Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:37.235820 env[1734]: time="2025-05-17T00:36:37.235792979Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:37.246961 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:36:37.247191 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calida9fe7f9313: link becomes ready May 17 00:36:37.247303 env[1734]: time="2025-05-17T00:36:37.239690406Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:37.247303 env[1734]: time="2025-05-17T00:36:37.239946953Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:36:37.247995 systemd-networkd[1460]: calida9fe7f9313: Link UP May 17 00:36:37.248329 systemd-networkd[1460]: calida9fe7f9313: Gained carrier May 17 00:36:37.255430 (udev-worker)[3142]: Network interface NamePolicy= disabled on kernel command line. May 17 00:36:37.260804 env[1734]: time="2025-05-17T00:36:37.260750466Z" level=info msg="CreateContainer within sandbox \"9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:36:37.277601 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount17030388.mount: Deactivated successfully. May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.082 [INFO][3122] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0 nginx-deployment-8587fbcb89- default b2a1e976-fca1-42ec-84b2-9d024b97e985 1271 0 2025-05-17 00:36:21 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.24.63 nginx-deployment-8587fbcb89-6szrw eth0 default [] [] [kns.default ksa.default.default] calida9fe7f9313 [] [] }} ContainerID="eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" Namespace="default" Pod="nginx-deployment-8587fbcb89-6szrw" WorkloadEndpoint="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-" May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.083 [INFO][3122] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" Namespace="default" Pod="nginx-deployment-8587fbcb89-6szrw" WorkloadEndpoint="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.165 [INFO][3135] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" HandleID="k8s-pod-network.eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" Workload="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.172 [INFO][3135] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" HandleID="k8s-pod-network.eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" Workload="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003254d0), Attrs:map[string]string{"namespace":"default", "node":"172.31.24.63", "pod":"nginx-deployment-8587fbcb89-6szrw", "timestamp":"2025-05-17 00:36:37.165227101 +0000 UTC"}, Hostname:"172.31.24.63", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.172 [INFO][3135] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.172 [INFO][3135] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.172 [INFO][3135] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.24.63' May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.180 [INFO][3135] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" host="172.31.24.63" May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.194 [INFO][3135] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.24.63" May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.200 [INFO][3135] ipam/ipam.go 511: Trying affinity for 192.168.88.192/26 host="172.31.24.63" May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.204 [INFO][3135] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.192/26 host="172.31.24.63" May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.210 [INFO][3135] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.192/26 host="172.31.24.63" May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.211 [INFO][3135] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.192/26 handle="k8s-pod-network.eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" host="172.31.24.63" May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.213 [INFO][3135] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.218 [INFO][3135] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.192/26 handle="k8s-pod-network.eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" host="172.31.24.63" May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.228 [INFO][3135] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.194/26] block=192.168.88.192/26 handle="k8s-pod-network.eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" host="172.31.24.63" May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.228 [INFO][3135] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.194/26] handle="k8s-pod-network.eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" host="172.31.24.63" May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.228 [INFO][3135] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:37.286653 env[1734]: 2025-05-17 00:36:37.228 [INFO][3135] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.194/26] IPv6=[] ContainerID="eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" HandleID="k8s-pod-network.eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" Workload="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:36:37.287779 env[1734]: 2025-05-17 00:36:37.232 [INFO][3122] cni-plugin/k8s.go 418: Populated endpoint ContainerID="eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" Namespace="default" Pod="nginx-deployment-8587fbcb89-6szrw" WorkloadEndpoint="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"b2a1e976-fca1-42ec-84b2-9d024b97e985", ResourceVersion:"1271", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.63", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-6szrw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calida9fe7f9313", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:37.287779 env[1734]: 2025-05-17 00:36:37.232 [INFO][3122] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.194/32] ContainerID="eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" Namespace="default" Pod="nginx-deployment-8587fbcb89-6szrw" WorkloadEndpoint="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:36:37.287779 env[1734]: 2025-05-17 00:36:37.232 [INFO][3122] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calida9fe7f9313 ContainerID="eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" Namespace="default" Pod="nginx-deployment-8587fbcb89-6szrw" WorkloadEndpoint="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:36:37.287779 env[1734]: 2025-05-17 00:36:37.240 [INFO][3122] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" Namespace="default" Pod="nginx-deployment-8587fbcb89-6szrw" WorkloadEndpoint="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:36:37.287779 env[1734]: 2025-05-17 00:36:37.261 [INFO][3122] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" Namespace="default" Pod="nginx-deployment-8587fbcb89-6szrw" WorkloadEndpoint="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"b2a1e976-fca1-42ec-84b2-9d024b97e985", ResourceVersion:"1271", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.63", ContainerID:"eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a", Pod:"nginx-deployment-8587fbcb89-6szrw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calida9fe7f9313", MAC:"a6:b1:49:25:c9:2f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:37.287779 env[1734]: 2025-05-17 00:36:37.281 [INFO][3122] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a" Namespace="default" Pod="nginx-deployment-8587fbcb89-6szrw" WorkloadEndpoint="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:36:37.293110 env[1734]: time="2025-05-17T00:36:37.293027133Z" level=info msg="CreateContainer within sandbox \"9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"da934e1ec23d5a40f9d6237d9340b364eb8a8a62420bff25ec22cad1c0da558a\"" May 17 00:36:37.295009 env[1734]: time="2025-05-17T00:36:37.294971122Z" level=info msg="StartContainer for \"da934e1ec23d5a40f9d6237d9340b364eb8a8a62420bff25ec22cad1c0da558a\"" May 17 00:36:37.306000 audit[3158]: NETFILTER_CFG table=filter:72 family=2 entries=42 op=nft_register_chain pid=3158 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:37.306000 audit[3158]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffe14c16b10 a2=0 a3=7ffe14c16afc items=0 ppid=2750 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:37.306000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:37.317418 env[1734]: time="2025-05-17T00:36:37.317348681Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:37.317418 env[1734]: time="2025-05-17T00:36:37.317388809Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:37.317624 env[1734]: time="2025-05-17T00:36:37.317404420Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:37.317837 env[1734]: time="2025-05-17T00:36:37.317795058Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a pid=3161 runtime=io.containerd.runc.v2 May 17 00:36:37.342148 systemd[1]: Started cri-containerd-da934e1ec23d5a40f9d6237d9340b364eb8a8a62420bff25ec22cad1c0da558a.scope. May 17 00:36:37.357534 systemd[1]: Started cri-containerd-eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a.scope. May 17 00:36:37.372000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.372000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fa9dd7918b8 items=0 ppid=3020 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:37.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461393334653165633233643561343066396436323337643933343062 May 17 00:36:37.373000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.373000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.373000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.373000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.373000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.373000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.373000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.373000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.373000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.373000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.373000 audit: BPF prog-id=113 op=LOAD May 17 00:36:37.373000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00027ff68 items=0 ppid=3020 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:37.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461393334653165633233643561343066396436323337643933343062 May 17 00:36:37.374000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.374000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.374000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.374000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.374000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.374000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.374000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.374000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.374000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.374000 audit: BPF prog-id=114 op=LOAD May 17 00:36:37.374000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00027ffb8 items=0 ppid=3020 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:37.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461393334653165633233643561343066396436323337643933343062 May 17 00:36:37.375000 audit: BPF prog-id=114 op=UNLOAD May 17 00:36:37.375000 audit: BPF prog-id=113 op=UNLOAD May 17 00:36:37.375000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.375000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.375000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.375000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.375000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.375000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.375000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.375000 audit[3177]: AVC avc: denied { perfmon } for pid=3177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.375000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.375000 audit[3177]: AVC avc: denied { bpf } for pid=3177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.375000 audit: BPF prog-id=115 op=LOAD May 17 00:36:37.375000 audit[3177]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003ec048 items=0 ppid=3020 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:37.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461393334653165633233643561343066396436323337643933343062 May 17 00:36:37.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.380000 audit: BPF prog-id=116 op=LOAD May 17 00:36:37.381000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3161 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:37.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562306632613430313433323234356339656133656330353530333164 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3161 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:37.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562306632613430313433323234356339656133656330353530333164 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit: BPF prog-id=117 op=LOAD May 17 00:36:37.381000 audit[3178]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000025380 items=0 ppid=3161 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:37.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562306632613430313433323234356339656133656330353530333164 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit: BPF prog-id=118 op=LOAD May 17 00:36:37.381000 audit[3178]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0000253c8 items=0 ppid=3161 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:37.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562306632613430313433323234356339656133656330353530333164 May 17 00:36:37.382000 audit: BPF prog-id=118 op=UNLOAD May 17 00:36:37.382000 audit: BPF prog-id=117 op=UNLOAD May 17 00:36:37.382000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit: BPF prog-id=119 op=LOAD May 17 00:36:37.382000 audit[3178]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0000257d8 items=0 ppid=3161 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:37.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562306632613430313433323234356339656133656330353530333164 May 17 00:36:37.404965 env[1734]: time="2025-05-17T00:36:37.404911260Z" level=info msg="StartContainer for \"da934e1ec23d5a40f9d6237d9340b364eb8a8a62420bff25ec22cad1c0da558a\" returns successfully" May 17 00:36:37.428963 env[1734]: time="2025-05-17T00:36:37.428918798Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-6szrw,Uid:b2a1e976-fca1-42ec-84b2-9d024b97e985,Namespace:default,Attempt:1,} returns sandbox id \"eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a\"" May 17 00:36:37.430844 env[1734]: time="2025-05-17T00:36:37.430813384Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:36:37.619512 kubelet[2125]: E0517 00:36:37.619455 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:37.732273 kubelet[2125]: I0517 00:36:37.732228 2125 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:36:37.732273 kubelet[2125]: I0517 00:36:37.732274 2125 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:36:37.954792 kubelet[2125]: I0517 00:36:37.954535 2125 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-rxhbw" podStartSLOduration=25.85738757 podStartE2EDuration="28.954517918s" podCreationTimestamp="2025-05-17 00:36:09 +0000 UTC" firstStartedPulling="2025-05-17 00:36:34.152277558 +0000 UTC m=+25.102093090" lastFinishedPulling="2025-05-17 00:36:37.249407894 +0000 UTC m=+28.199223438" observedRunningTime="2025-05-17 00:36:37.953282112 +0000 UTC m=+28.903097667" watchObservedRunningTime="2025-05-17 00:36:37.954517918 +0000 UTC m=+28.904333473" May 17 00:36:38.615607 systemd-networkd[1460]: calida9fe7f9313: Gained IPv6LL May 17 00:36:38.619671 kubelet[2125]: E0517 00:36:38.619587 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:39.620005 kubelet[2125]: E0517 00:36:39.619941 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:40.199167 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3517124289.mount: Deactivated successfully. May 17 00:36:40.621199 kubelet[2125]: E0517 00:36:40.621091 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:41.621922 kubelet[2125]: E0517 00:36:41.621829 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:41.882061 env[1734]: time="2025-05-17T00:36:41.881658648Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:41.884542 env[1734]: time="2025-05-17T00:36:41.884502878Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:41.886292 env[1734]: time="2025-05-17T00:36:41.886247879Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:41.888383 env[1734]: time="2025-05-17T00:36:41.888350990Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:41.888871 env[1734]: time="2025-05-17T00:36:41.888839311Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:36:41.891181 env[1734]: time="2025-05-17T00:36:41.891147161Z" level=info msg="CreateContainer within sandbox \"eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 17 00:36:41.908361 env[1734]: time="2025-05-17T00:36:41.908316206Z" level=info msg="CreateContainer within sandbox \"eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"e2478376da0ff040101ff90f148b43e6db9f16219fa26657125e3888436f05ae\"" May 17 00:36:41.909425 env[1734]: time="2025-05-17T00:36:41.909329317Z" level=info msg="StartContainer for \"e2478376da0ff040101ff90f148b43e6db9f16219fa26657125e3888436f05ae\"" May 17 00:36:41.945885 systemd[1]: Started cri-containerd-e2478376da0ff040101ff90f148b43e6db9f16219fa26657125e3888436f05ae.scope. May 17 00:36:41.948858 systemd[1]: run-containerd-runc-k8s.io-e2478376da0ff040101ff90f148b43e6db9f16219fa26657125e3888436f05ae-runc.4XI27D.mount: Deactivated successfully. May 17 00:36:41.970932 kernel: kauditd_printk_skb: 196 callbacks suppressed May 17 00:36:41.971065 kernel: audit: type=1400 audit(1747442201.964:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.971110 kernel: audit: type=1400 audit(1747442201.964:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.979540 kernel: audit: type=1400 audit(1747442201.964:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.979695 kernel: audit: type=1400 audit(1747442201.964:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.983081 kernel: audit: type=1400 audit(1747442201.964:742): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.986506 kernel: audit: type=1400 audit(1747442201.965:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.990128 kernel: audit: type=1400 audit(1747442201.965:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.994448 kernel: audit: type=1400 audit(1747442201.965:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:42.006867 kernel: audit: type=1400 audit(1747442201.965:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:42.007055 kernel: audit: type=1400 audit(1747442201.969:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.969000 audit: BPF prog-id=120 op=LOAD May 17 00:36:41.972000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.972000 audit[3244]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3161 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:41.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532343738333736646130666630343031303166663930663134386234 May 17 00:36:41.972000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.972000 audit[3244]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3161 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:41.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532343738333736646130666630343031303166663930663134386234 May 17 00:36:41.972000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.972000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.972000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.972000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.972000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.972000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.972000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.972000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.972000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.972000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.972000 audit: BPF prog-id=121 op=LOAD May 17 00:36:41.972000 audit[3244]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000205cc0 items=0 ppid=3161 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:41.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532343738333736646130666630343031303166663930663134386234 May 17 00:36:41.978000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.978000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.978000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.978000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.978000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.978000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.978000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.978000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.978000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.978000 audit: BPF prog-id=122 op=LOAD May 17 00:36:41.978000 audit[3244]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000205d08 items=0 ppid=3161 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:41.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532343738333736646130666630343031303166663930663134386234 May 17 00:36:41.978000 audit: BPF prog-id=122 op=UNLOAD May 17 00:36:41.978000 audit: BPF prog-id=121 op=UNLOAD May 17 00:36:41.979000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.979000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.979000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.979000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.979000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.979000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.979000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.979000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.979000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.979000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:41.979000 audit: BPF prog-id=123 op=LOAD May 17 00:36:41.979000 audit[3244]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00027e118 items=0 ppid=3161 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:41.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532343738333736646130666630343031303166663930663134386234 May 17 00:36:42.016150 env[1734]: time="2025-05-17T00:36:42.016100965Z" level=info msg="StartContainer for \"e2478376da0ff040101ff90f148b43e6db9f16219fa26657125e3888436f05ae\" returns successfully" May 17 00:36:42.623015 kubelet[2125]: E0517 00:36:42.622963 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:43.623560 kubelet[2125]: E0517 00:36:43.623516 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:43.919529 systemd[1]: run-containerd-runc-k8s.io-4e77743d1a39d026a80ea5e8eb8aab2766c220223aaec3e34c551c16152f32d6-runc.ShEFYy.mount: Deactivated successfully. May 17 00:36:44.065141 kubelet[2125]: I0517 00:36:44.065081 2125 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-6szrw" podStartSLOduration=18.605401688 podStartE2EDuration="23.065064986s" podCreationTimestamp="2025-05-17 00:36:21 +0000 UTC" firstStartedPulling="2025-05-17 00:36:37.430412333 +0000 UTC m=+28.380227878" lastFinishedPulling="2025-05-17 00:36:41.890075641 +0000 UTC m=+32.839891176" observedRunningTime="2025-05-17 00:36:43.00025137 +0000 UTC m=+33.950066955" watchObservedRunningTime="2025-05-17 00:36:44.065064986 +0000 UTC m=+35.014880538" May 17 00:36:44.624496 kubelet[2125]: E0517 00:36:44.624433 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:45.131379 amazon-ssm-agent[1758]: 2025-05-17 00:36:45 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated May 17 00:36:45.624724 kubelet[2125]: E0517 00:36:45.624670 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:46.069821 update_engine[1727]: I0517 00:36:46.069569 1727 update_attempter.cc:509] Updating boot flags... May 17 00:36:46.624922 kubelet[2125]: E0517 00:36:46.624861 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:47.625508 kubelet[2125]: E0517 00:36:47.625464 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:48.626062 kubelet[2125]: E0517 00:36:48.626017 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:49.595792 kubelet[2125]: E0517 00:36:49.595738 2125 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:49.626821 kubelet[2125]: E0517 00:36:49.626762 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:50.435000 audit[3507]: NETFILTER_CFG table=filter:73 family=2 entries=24 op=nft_register_rule pid=3507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:50.438247 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:36:50.438337 kernel: audit: type=1325 audit(1747442210.435:756): table=filter:73 family=2 entries=24 op=nft_register_rule pid=3507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:50.435000 audit[3507]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffe4be497c0 a2=0 a3=7ffe4be497ac items=0 ppid=2343 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:50.449495 kernel: audit: type=1300 audit(1747442210.435:756): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffe4be497c0 a2=0 a3=7ffe4be497ac items=0 ppid=2343 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:50.449625 kernel: audit: type=1327 audit(1747442210.435:756): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:50.435000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:50.458000 audit[3507]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=3507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:50.458000 audit[3507]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe4be497c0 a2=0 a3=0 items=0 ppid=2343 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:50.471283 kernel: audit: type=1325 audit(1747442210.458:757): table=nat:74 family=2 entries=22 op=nft_register_rule pid=3507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:50.471417 kernel: audit: type=1300 audit(1747442210.458:757): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe4be497c0 a2=0 a3=0 items=0 ppid=2343 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:50.471446 kernel: audit: type=1327 audit(1747442210.458:757): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:50.458000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:50.627633 kubelet[2125]: E0517 00:36:50.627593 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:50.671000 audit[3509]: NETFILTER_CFG table=filter:75 family=2 entries=36 op=nft_register_rule pid=3509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:50.671000 audit[3509]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fff43c1b240 a2=0 a3=7fff43c1b22c items=0 ppid=2343 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:50.684182 kernel: audit: type=1325 audit(1747442210.671:758): table=filter:75 family=2 entries=36 op=nft_register_rule pid=3509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:50.684362 kernel: audit: type=1300 audit(1747442210.671:758): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fff43c1b240 a2=0 a3=7fff43c1b22c items=0 ppid=2343 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:50.684415 kernel: audit: type=1327 audit(1747442210.671:758): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:50.671000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:50.683000 audit[3509]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=3509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:50.693005 kernel: audit: type=1325 audit(1747442210.683:759): table=nat:76 family=2 entries=22 op=nft_register_rule pid=3509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:50.683000 audit[3509]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff43c1b240 a2=0 a3=0 items=0 ppid=2343 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:50.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:51.627808 kubelet[2125]: E0517 00:36:51.627756 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:52.627891 kubelet[2125]: E0517 00:36:52.627856 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:52.975918 systemd[1]: Created slice kubepods-besteffort-pod6b047d28_b8a9_48c3_a505_b30c4e039ff5.slice. May 17 00:36:53.050021 kubelet[2125]: I0517 00:36:53.049968 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nj2vt\" (UniqueName: \"kubernetes.io/projected/6b047d28-b8a9-48c3-a505-b30c4e039ff5-kube-api-access-nj2vt\") pod \"nfs-server-provisioner-0\" (UID: \"6b047d28-b8a9-48c3-a505-b30c4e039ff5\") " pod="default/nfs-server-provisioner-0" May 17 00:36:53.050222 kubelet[2125]: I0517 00:36:53.050061 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/6b047d28-b8a9-48c3-a505-b30c4e039ff5-data\") pod \"nfs-server-provisioner-0\" (UID: \"6b047d28-b8a9-48c3-a505-b30c4e039ff5\") " pod="default/nfs-server-provisioner-0" May 17 00:36:53.282747 env[1734]: time="2025-05-17T00:36:53.282608976Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6b047d28-b8a9-48c3-a505-b30c4e039ff5,Namespace:default,Attempt:0,}" May 17 00:36:53.535422 systemd-networkd[1460]: cali60e51b789ff: Link UP May 17 00:36:53.539986 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:36:53.540110 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 17 00:36:53.540569 systemd-networkd[1460]: cali60e51b789ff: Gained carrier May 17 00:36:53.542422 (udev-worker)[3530]: Network interface NamePolicy= disabled on kernel command line. May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.367 [INFO][3512] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.24.63-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 6b047d28-b8a9-48c3-a505-b30c4e039ff5 1353 0 2025-05-17 00:36:52 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.24.63 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.63-k8s-nfs--server--provisioner--0-" May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.367 [INFO][3512] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.63-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.438 [INFO][3524] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" HandleID="k8s-pod-network.dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" Workload="172.31.24.63-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.438 [INFO][3524] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" HandleID="k8s-pod-network.dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" Workload="172.31.24.63-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235020), Attrs:map[string]string{"namespace":"default", "node":"172.31.24.63", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-17 00:36:53.438173098 +0000 UTC"}, Hostname:"172.31.24.63", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.438 [INFO][3524] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.438 [INFO][3524] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.438 [INFO][3524] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.24.63' May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.464 [INFO][3524] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" host="172.31.24.63" May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.490 [INFO][3524] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.24.63" May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.500 [INFO][3524] ipam/ipam.go 511: Trying affinity for 192.168.88.192/26 host="172.31.24.63" May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.503 [INFO][3524] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.192/26 host="172.31.24.63" May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.506 [INFO][3524] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.192/26 host="172.31.24.63" May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.506 [INFO][3524] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.192/26 handle="k8s-pod-network.dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" host="172.31.24.63" May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.508 [INFO][3524] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.516 [INFO][3524] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.192/26 handle="k8s-pod-network.dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" host="172.31.24.63" May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.530 [INFO][3524] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.195/26] block=192.168.88.192/26 handle="k8s-pod-network.dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" host="172.31.24.63" May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.530 [INFO][3524] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.195/26] handle="k8s-pod-network.dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" host="172.31.24.63" May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.530 [INFO][3524] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:53.566783 env[1734]: 2025-05-17 00:36:53.530 [INFO][3524] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.195/26] IPv6=[] ContainerID="dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" HandleID="k8s-pod-network.dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" Workload="172.31.24.63-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:53.567481 env[1734]: 2025-05-17 00:36:53.532 [INFO][3512] cni-plugin/k8s.go 418: Populated endpoint ContainerID="dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.63-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.63-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6b047d28-b8a9-48c3-a505-b30c4e039ff5", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.63", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.88.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:53.567481 env[1734]: 2025-05-17 00:36:53.532 [INFO][3512] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.195/32] ContainerID="dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.63-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:53.567481 env[1734]: 2025-05-17 00:36:53.532 [INFO][3512] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.63-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:53.567481 env[1734]: 2025-05-17 00:36:53.541 [INFO][3512] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.63-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:53.567660 env[1734]: 2025-05-17 00:36:53.541 [INFO][3512] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.63-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.63-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6b047d28-b8a9-48c3-a505-b30c4e039ff5", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.63", ContainerID:"dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.88.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"52:3a:cc:4d:8e:ca", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:53.567660 env[1734]: 2025-05-17 00:36:53.565 [INFO][3512] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.24.63-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:53.579130 env[1734]: time="2025-05-17T00:36:53.579035282Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:53.579130 env[1734]: time="2025-05-17T00:36:53.579088295Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:53.579472 env[1734]: time="2025-05-17T00:36:53.579103594Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:53.579645 env[1734]: time="2025-05-17T00:36:53.579516994Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c pid=3545 runtime=io.containerd.runc.v2 May 17 00:36:53.612129 systemd[1]: Started cri-containerd-dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c.scope. May 17 00:36:53.628135 kubelet[2125]: E0517 00:36:53.628090 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:53.629000 audit[3572]: NETFILTER_CFG table=filter:77 family=2 entries=46 op=nft_register_chain pid=3572 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:53.629000 audit[3572]: SYSCALL arch=c000003e syscall=46 success=yes exit=23608 a0=3 a1=7ffc4a1460c0 a2=0 a3=7ffc4a1460ac items=0 ppid=2750 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.629000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:53.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.633000 audit: BPF prog-id=124 op=LOAD May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3545 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383064303565393034636639663738626330306636656464386162 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3545 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383064303565393034636639663738626330306636656464386162 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit: BPF prog-id=125 op=LOAD May 17 00:36:53.634000 audit[3553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002d3ea0 items=0 ppid=3545 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383064303565393034636639663738626330306636656464386162 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit: BPF prog-id=126 op=LOAD May 17 00:36:53.634000 audit[3553]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002d3ee8 items=0 ppid=3545 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383064303565393034636639663738626330306636656464386162 May 17 00:36:53.634000 audit: BPF prog-id=126 op=UNLOAD May 17 00:36:53.634000 audit: BPF prog-id=125 op=UNLOAD May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:53.634000 audit: BPF prog-id=127 op=LOAD May 17 00:36:53.634000 audit[3553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003d62f8 items=0 ppid=3545 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383064303565393034636639663738626330306636656464386162 May 17 00:36:53.682957 env[1734]: time="2025-05-17T00:36:53.682205010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6b047d28-b8a9-48c3-a505-b30c4e039ff5,Namespace:default,Attempt:0,} returns sandbox id \"dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c\"" May 17 00:36:53.684062 env[1734]: time="2025-05-17T00:36:53.684026687Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 17 00:36:54.187334 systemd[1]: run-containerd-runc-k8s.io-dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c-runc.OMXHZ2.mount: Deactivated successfully. May 17 00:36:54.629334 kubelet[2125]: E0517 00:36:54.628564 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:55.383803 systemd-networkd[1460]: cali60e51b789ff: Gained IPv6LL May 17 00:36:55.628810 kubelet[2125]: E0517 00:36:55.628722 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:56.208716 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1904315645.mount: Deactivated successfully. May 17 00:36:56.637896 kubelet[2125]: E0517 00:36:56.637851 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:57.640980 kubelet[2125]: E0517 00:36:57.640922 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:58.313977 env[1734]: time="2025-05-17T00:36:58.313916179Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:58.316274 env[1734]: time="2025-05-17T00:36:58.316220843Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:58.318768 env[1734]: time="2025-05-17T00:36:58.318730351Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:58.320285 env[1734]: time="2025-05-17T00:36:58.320253187Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:58.321027 env[1734]: time="2025-05-17T00:36:58.320988566Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 17 00:36:58.353619 env[1734]: time="2025-05-17T00:36:58.352285285Z" level=info msg="CreateContainer within sandbox \"dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 17 00:36:58.370223 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2081680141.mount: Deactivated successfully. May 17 00:36:58.373330 env[1734]: time="2025-05-17T00:36:58.373257637Z" level=info msg="CreateContainer within sandbox \"dd80d05e904cf9f78bc00f6edd8abfcd35cc04af9a13125c832f6e665b5d240c\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"47c175a84f653ecfec0077ae117b21594342a13278e2dd27b7fa3422a54f680c\"" May 17 00:36:58.375406 env[1734]: time="2025-05-17T00:36:58.374109483Z" level=info msg="StartContainer for \"47c175a84f653ecfec0077ae117b21594342a13278e2dd27b7fa3422a54f680c\"" May 17 00:36:58.397677 systemd[1]: Started cri-containerd-47c175a84f653ecfec0077ae117b21594342a13278e2dd27b7fa3422a54f680c.scope. May 17 00:36:58.430936 kernel: kauditd_printk_skb: 62 callbacks suppressed May 17 00:36:58.431108 kernel: audit: type=1400 audit(1747442218.422:779): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.431156 kernel: audit: type=1400 audit(1747442218.422:780): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.435932 kernel: audit: type=1400 audit(1747442218.422:781): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.439932 kernel: audit: type=1400 audit(1747442218.422:782): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.444922 kernel: audit: type=1400 audit(1747442218.422:783): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.454577 kernel: audit: type=1400 audit(1747442218.422:784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.454643 kernel: audit: type=1400 audit(1747442218.422:785): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.455265 kernel: audit: type=1400 audit(1747442218.422:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.462027 env[1734]: time="2025-05-17T00:36:58.461874883Z" level=info msg="StartContainer for \"47c175a84f653ecfec0077ae117b21594342a13278e2dd27b7fa3422a54f680c\" returns successfully" May 17 00:36:58.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.466927 kernel: audit: type=1400 audit(1747442218.422:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.422000 audit: BPF prog-id=128 op=LOAD May 17 00:36:58.423000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3545 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:58.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633137356138346636353365636665633030373761653131376232 May 17 00:36:58.473932 kernel: audit: type=1400 audit(1747442218.422:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3545 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:58.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633137356138346636353365636665633030373761653131376232 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit: BPF prog-id=129 op=LOAD May 17 00:36:58.423000 audit[3589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00016d7a0 items=0 ppid=3545 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:58.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633137356138346636353365636665633030373761653131376232 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.423000 audit: BPF prog-id=130 op=LOAD May 17 00:36:58.423000 audit[3589]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00016d7e8 items=0 ppid=3545 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:58.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633137356138346636353365636665633030373761653131376232 May 17 00:36:58.430000 audit: BPF prog-id=130 op=UNLOAD May 17 00:36:58.430000 audit: BPF prog-id=129 op=UNLOAD May 17 00:36:58.430000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.430000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.430000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.430000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.430000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.430000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.430000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.430000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.430000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.430000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:58.430000 audit: BPF prog-id=131 op=LOAD May 17 00:36:58.430000 audit[3589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00016dbf8 items=0 ppid=3545 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:58.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633137356138346636353365636665633030373761653131376232 May 17 00:36:58.520000 audit[3618]: AVC avc: denied { search } for pid=3618 comm="rpcbind" name="crypto" dev="proc" ino=23844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c223 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:36:58.520000 audit[3618]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f28498960c0 a2=0 a3=0 items=0 ppid=3601 pid=3618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c223 key=(null) May 17 00:36:58.520000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 17 00:36:58.560000 audit[3623]: AVC avc: denied { search } for pid=3623 comm="dbus-daemon" name="crypto" dev="proc" ino=23844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c223 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:36:58.560000 audit[3623]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff2c61720c0 a2=0 a3=0 items=0 ppid=3601 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c223 key=(null) May 17 00:36:58.560000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:36:58.564000 audit[3624]: AVC avc: denied { watch } for pid=3624 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537480 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c223 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c122,c223 tclass=dir permissive=0 May 17 00:36:58.564000 audit[3624]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55dd3661fb50 a2=2c8 a3=7ffe1fdb67ec items=0 ppid=3601 pid=3624 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c223 key=(null) May 17 00:36:58.564000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:36:58.570000 audit[3625]: AVC avc: denied { read } for pid=3625 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23164 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c223 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 17 00:36:58.570000 audit[3625]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fad8a88f320 a1=80000 a2=d a3=7ffee8cd1de0 items=0 ppid=3601 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c223 key=(null) May 17 00:36:58.570000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:36:58.570000 audit[3625]: AVC avc: denied { search } for pid=3625 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c223 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:36:58.570000 audit[3625]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fad89de30c0 a2=0 a3=0 items=0 ppid=3601 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c223 key=(null) May 17 00:36:58.570000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:36:58.641641 kubelet[2125]: E0517 00:36:58.641598 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:59.125449 kubelet[2125]: I0517 00:36:59.125377 2125 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.481393688 podStartE2EDuration="7.125355444s" podCreationTimestamp="2025-05-17 00:36:52 +0000 UTC" firstStartedPulling="2025-05-17 00:36:53.68365807 +0000 UTC m=+44.633473605" lastFinishedPulling="2025-05-17 00:36:58.327619831 +0000 UTC m=+49.277435361" observedRunningTime="2025-05-17 00:36:59.123856501 +0000 UTC m=+50.073672064" watchObservedRunningTime="2025-05-17 00:36:59.125355444 +0000 UTC m=+50.075171025" May 17 00:36:59.364748 systemd[1]: run-containerd-runc-k8s.io-47c175a84f653ecfec0077ae117b21594342a13278e2dd27b7fa3422a54f680c-runc.IAcVkp.mount: Deactivated successfully. May 17 00:36:59.465000 audit[3632]: NETFILTER_CFG table=filter:78 family=2 entries=24 op=nft_register_rule pid=3632 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:59.465000 audit[3632]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffca60a3250 a2=0 a3=7ffca60a323c items=0 ppid=2343 pid=3632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:59.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:59.491000 audit[3632]: NETFILTER_CFG table=nat:79 family=2 entries=106 op=nft_register_chain pid=3632 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:59.491000 audit[3632]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffca60a3250 a2=0 a3=7ffca60a323c items=0 ppid=2343 pid=3632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:59.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:59.642163 kubelet[2125]: E0517 00:36:59.642109 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:00.642626 kubelet[2125]: E0517 00:37:00.642585 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:01.643647 kubelet[2125]: E0517 00:37:01.643593 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:02.644004 kubelet[2125]: E0517 00:37:02.643957 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:03.645292 kubelet[2125]: E0517 00:37:03.644863 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:04.645577 kubelet[2125]: E0517 00:37:04.645530 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:05.646650 kubelet[2125]: E0517 00:37:05.646606 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:06.647272 kubelet[2125]: E0517 00:37:06.647214 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:07.647732 kubelet[2125]: E0517 00:37:07.647689 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:08.648647 kubelet[2125]: E0517 00:37:08.648603 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:09.595622 kubelet[2125]: E0517 00:37:09.595562 2125 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:09.635002 env[1734]: time="2025-05-17T00:37:09.634961936Z" level=info msg="StopPodSandbox for \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\"" May 17 00:37:09.649646 kubelet[2125]: E0517 00:37:09.649547 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:09.929424 env[1734]: 2025-05-17 00:37:09.889 [WARNING][3666] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.63-k8s-csi--node--driver--rxhbw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d1b15cac-f557-4eeb-9187-ac2f4bb11e6e", ResourceVersion:"1284", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.63", ContainerID:"9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093", Pod:"csi-node-driver-rxhbw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6c1dff7500d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:09.929424 env[1734]: 2025-05-17 00:37:09.889 [INFO][3666] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:37:09.929424 env[1734]: 2025-05-17 00:37:09.889 [INFO][3666] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" iface="eth0" netns="" May 17 00:37:09.929424 env[1734]: 2025-05-17 00:37:09.889 [INFO][3666] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:37:09.929424 env[1734]: 2025-05-17 00:37:09.889 [INFO][3666] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:37:09.929424 env[1734]: 2025-05-17 00:37:09.911 [INFO][3675] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" HandleID="k8s-pod-network.b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" Workload="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:37:09.929424 env[1734]: 2025-05-17 00:37:09.911 [INFO][3675] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:09.929424 env[1734]: 2025-05-17 00:37:09.911 [INFO][3675] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:09.929424 env[1734]: 2025-05-17 00:37:09.923 [WARNING][3675] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" HandleID="k8s-pod-network.b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" Workload="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:37:09.929424 env[1734]: 2025-05-17 00:37:09.923 [INFO][3675] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" HandleID="k8s-pod-network.b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" Workload="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:37:09.929424 env[1734]: 2025-05-17 00:37:09.926 [INFO][3675] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:09.929424 env[1734]: 2025-05-17 00:37:09.927 [INFO][3666] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:37:09.930065 env[1734]: time="2025-05-17T00:37:09.929452464Z" level=info msg="TearDown network for sandbox \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\" successfully" May 17 00:37:09.930065 env[1734]: time="2025-05-17T00:37:09.929480381Z" level=info msg="StopPodSandbox for \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\" returns successfully" May 17 00:37:09.930124 env[1734]: time="2025-05-17T00:37:09.930078757Z" level=info msg="RemovePodSandbox for \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\"" May 17 00:37:09.930153 env[1734]: time="2025-05-17T00:37:09.930107155Z" level=info msg="Forcibly stopping sandbox \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\"" May 17 00:37:10.123361 env[1734]: 2025-05-17 00:37:10.029 [WARNING][3689] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.63-k8s-csi--node--driver--rxhbw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d1b15cac-f557-4eeb-9187-ac2f4bb11e6e", ResourceVersion:"1284", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.63", ContainerID:"9b7a01e9c251ae98cf4e61526d3e754d8e9620daff6d0c23a03bf36cba9f1093", Pod:"csi-node-driver-rxhbw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6c1dff7500d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:10.123361 env[1734]: 2025-05-17 00:37:10.029 [INFO][3689] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:37:10.123361 env[1734]: 2025-05-17 00:37:10.029 [INFO][3689] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" iface="eth0" netns="" May 17 00:37:10.123361 env[1734]: 2025-05-17 00:37:10.029 [INFO][3689] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:37:10.123361 env[1734]: 2025-05-17 00:37:10.029 [INFO][3689] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:37:10.123361 env[1734]: 2025-05-17 00:37:10.086 [INFO][3697] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" HandleID="k8s-pod-network.b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" Workload="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:37:10.123361 env[1734]: 2025-05-17 00:37:10.087 [INFO][3697] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:10.123361 env[1734]: 2025-05-17 00:37:10.087 [INFO][3697] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:10.123361 env[1734]: 2025-05-17 00:37:10.116 [WARNING][3697] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" HandleID="k8s-pod-network.b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" Workload="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:37:10.123361 env[1734]: 2025-05-17 00:37:10.116 [INFO][3697] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" HandleID="k8s-pod-network.b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" Workload="172.31.24.63-k8s-csi--node--driver--rxhbw-eth0" May 17 00:37:10.123361 env[1734]: 2025-05-17 00:37:10.120 [INFO][3697] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:10.123361 env[1734]: 2025-05-17 00:37:10.121 [INFO][3689] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2" May 17 00:37:10.124172 env[1734]: time="2025-05-17T00:37:10.123399021Z" level=info msg="TearDown network for sandbox \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\" successfully" May 17 00:37:10.126346 env[1734]: time="2025-05-17T00:37:10.126297173Z" level=info msg="RemovePodSandbox \"b667fb6dafdfc2a8c62fd0c6e00cabecbbe88af6003d071eae143a867ddad5c2\" returns successfully" May 17 00:37:10.126884 env[1734]: time="2025-05-17T00:37:10.126839597Z" level=info msg="StopPodSandbox for \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\"" May 17 00:37:10.225866 env[1734]: 2025-05-17 00:37:10.181 [WARNING][3712] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"b2a1e976-fca1-42ec-84b2-9d024b97e985", ResourceVersion:"1300", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.63", ContainerID:"eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a", Pod:"nginx-deployment-8587fbcb89-6szrw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calida9fe7f9313", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:10.225866 env[1734]: 2025-05-17 00:37:10.182 [INFO][3712] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:37:10.225866 env[1734]: 2025-05-17 00:37:10.182 [INFO][3712] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" iface="eth0" netns="" May 17 00:37:10.225866 env[1734]: 2025-05-17 00:37:10.182 [INFO][3712] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:37:10.225866 env[1734]: 2025-05-17 00:37:10.182 [INFO][3712] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:37:10.225866 env[1734]: 2025-05-17 00:37:10.206 [INFO][3719] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" HandleID="k8s-pod-network.bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" Workload="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:37:10.225866 env[1734]: 2025-05-17 00:37:10.206 [INFO][3719] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:10.225866 env[1734]: 2025-05-17 00:37:10.206 [INFO][3719] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:10.225866 env[1734]: 2025-05-17 00:37:10.217 [WARNING][3719] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" HandleID="k8s-pod-network.bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" Workload="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:37:10.225866 env[1734]: 2025-05-17 00:37:10.217 [INFO][3719] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" HandleID="k8s-pod-network.bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" Workload="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:37:10.225866 env[1734]: 2025-05-17 00:37:10.222 [INFO][3719] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:10.225866 env[1734]: 2025-05-17 00:37:10.223 [INFO][3712] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:37:10.225866 env[1734]: time="2025-05-17T00:37:10.225525056Z" level=info msg="TearDown network for sandbox \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\" successfully" May 17 00:37:10.225866 env[1734]: time="2025-05-17T00:37:10.225553150Z" level=info msg="StopPodSandbox for \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\" returns successfully" May 17 00:37:10.226851 env[1734]: time="2025-05-17T00:37:10.226821190Z" level=info msg="RemovePodSandbox for \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\"" May 17 00:37:10.226932 env[1734]: time="2025-05-17T00:37:10.226870940Z" level=info msg="Forcibly stopping sandbox \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\"" May 17 00:37:10.376534 env[1734]: 2025-05-17 00:37:10.274 [WARNING][3735] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"b2a1e976-fca1-42ec-84b2-9d024b97e985", ResourceVersion:"1300", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.63", ContainerID:"eb0f2a401432245c9ea3ec055031dbe174339014031a6583a1e5634d3e016d4a", Pod:"nginx-deployment-8587fbcb89-6szrw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calida9fe7f9313", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:10.376534 env[1734]: 2025-05-17 00:37:10.274 [INFO][3735] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:37:10.376534 env[1734]: 2025-05-17 00:37:10.274 [INFO][3735] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" iface="eth0" netns="" May 17 00:37:10.376534 env[1734]: 2025-05-17 00:37:10.274 [INFO][3735] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:37:10.376534 env[1734]: 2025-05-17 00:37:10.274 [INFO][3735] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:37:10.376534 env[1734]: 2025-05-17 00:37:10.331 [INFO][3742] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" HandleID="k8s-pod-network.bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" Workload="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:37:10.376534 env[1734]: 2025-05-17 00:37:10.331 [INFO][3742] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:10.376534 env[1734]: 2025-05-17 00:37:10.331 [INFO][3742] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:10.376534 env[1734]: 2025-05-17 00:37:10.368 [WARNING][3742] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" HandleID="k8s-pod-network.bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" Workload="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:37:10.376534 env[1734]: 2025-05-17 00:37:10.368 [INFO][3742] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" HandleID="k8s-pod-network.bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" Workload="172.31.24.63-k8s-nginx--deployment--8587fbcb89--6szrw-eth0" May 17 00:37:10.376534 env[1734]: 2025-05-17 00:37:10.373 [INFO][3742] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:10.376534 env[1734]: 2025-05-17 00:37:10.375 [INFO][3735] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70" May 17 00:37:10.377217 env[1734]: time="2025-05-17T00:37:10.376574420Z" level=info msg="TearDown network for sandbox \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\" successfully" May 17 00:37:10.379588 env[1734]: time="2025-05-17T00:37:10.379546496Z" level=info msg="RemovePodSandbox \"bdc1daa9ca4a60a3ce56db1a1f9359932b96f103b10a8abca9bb036f24a0ca70\" returns successfully" May 17 00:37:10.650250 kubelet[2125]: E0517 00:37:10.650194 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:11.651187 kubelet[2125]: E0517 00:37:11.651144 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:12.651610 kubelet[2125]: E0517 00:37:12.651569 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:13.652680 kubelet[2125]: E0517 00:37:13.652638 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:13.917769 systemd[1]: run-containerd-runc-k8s.io-4e77743d1a39d026a80ea5e8eb8aab2766c220223aaec3e34c551c16152f32d6-runc.CXWB2V.mount: Deactivated successfully. May 17 00:37:14.653580 kubelet[2125]: E0517 00:37:14.653478 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:15.653853 kubelet[2125]: E0517 00:37:15.653799 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:16.654560 kubelet[2125]: E0517 00:37:16.654379 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:17.655008 kubelet[2125]: E0517 00:37:17.654941 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:18.655966 kubelet[2125]: E0517 00:37:18.655894 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:19.656609 kubelet[2125]: E0517 00:37:19.656565 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:20.657263 kubelet[2125]: E0517 00:37:20.657193 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:21.658242 kubelet[2125]: E0517 00:37:21.658184 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:22.659328 kubelet[2125]: E0517 00:37:22.659158 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:23.660234 kubelet[2125]: E0517 00:37:23.660173 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:24.661072 kubelet[2125]: E0517 00:37:24.661002 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:25.661547 kubelet[2125]: E0517 00:37:25.661488 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:26.429688 systemd[1]: Created slice kubepods-besteffort-pod6d40e0cf_491f_4dab_a7dc_f1edf0ef620a.slice. May 17 00:37:26.583483 kubelet[2125]: I0517 00:37:26.583443 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7w7c9\" (UniqueName: \"kubernetes.io/projected/6d40e0cf-491f-4dab-a7dc-f1edf0ef620a-kube-api-access-7w7c9\") pod \"test-pod-1\" (UID: \"6d40e0cf-491f-4dab-a7dc-f1edf0ef620a\") " pod="default/test-pod-1" May 17 00:37:26.583634 kubelet[2125]: I0517 00:37:26.583500 2125 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-c6f651ac-7728-414e-a28f-5e564ed16bad\" (UniqueName: \"kubernetes.io/nfs/6d40e0cf-491f-4dab-a7dc-f1edf0ef620a-pvc-c6f651ac-7728-414e-a28f-5e564ed16bad\") pod \"test-pod-1\" (UID: \"6d40e0cf-491f-4dab-a7dc-f1edf0ef620a\") " pod="default/test-pod-1" May 17 00:37:26.662248 kubelet[2125]: E0517 00:37:26.662205 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:26.727602 kernel: Failed to create system directory netfs May 17 00:37:26.727743 kernel: kauditd_printk_skb: 68 callbacks suppressed May 17 00:37:26.727774 kernel: audit: type=1400 audit(1747442246.723:804): avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.723000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.734513 kernel: Failed to create system directory netfs May 17 00:37:26.734630 kernel: audit: type=1400 audit(1747442246.723:804): avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.723000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.741287 kernel: Failed to create system directory netfs May 17 00:37:26.741396 kernel: audit: type=1400 audit(1747442246.723:804): avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.723000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.747913 kernel: Failed to create system directory netfs May 17 00:37:26.748006 kernel: audit: type=1400 audit(1747442246.723:804): avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.723000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.723000 audit[3777]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558e03e0e5e0 a1=153bc a2=558e024472b0 a3=5 items=0 ppid=1777 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:26.771802 kernel: audit: type=1300 audit(1747442246.723:804): arch=c000003e syscall=175 success=yes exit=0 a0=558e03e0e5e0 a1=153bc a2=558e024472b0 a3=5 items=0 ppid=1777 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:26.723000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:37:26.777921 kernel: audit: type=1327 audit(1747442246.723:804): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.792366 kernel: Failed to create system directory fscache May 17 00:37:26.792481 kernel: audit: type=1400 audit(1747442246.778:805): avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.792534 kernel: Failed to create system directory fscache May 17 00:37:26.792561 kernel: audit: type=1400 audit(1747442246.778:805): avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.800402 kernel: Failed to create system directory fscache May 17 00:37:26.800540 kernel: audit: type=1400 audit(1747442246.778:805): avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.808403 kernel: Failed to create system directory fscache May 17 00:37:26.808511 kernel: audit: type=1400 audit(1747442246.778:805): avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.816162 kernel: Failed to create system directory fscache May 17 00:37:26.816290 kernel: Failed to create system directory fscache May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.819288 kernel: Failed to create system directory fscache May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.820779 kernel: Failed to create system directory fscache May 17 00:37:26.820965 kernel: Failed to create system directory fscache May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.822330 kernel: Failed to create system directory fscache May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.825143 kernel: Failed to create system directory fscache May 17 00:37:26.825213 kernel: Failed to create system directory fscache May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.827891 kernel: Failed to create system directory fscache May 17 00:37:26.827956 kernel: Failed to create system directory fscache May 17 00:37:26.778000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.778000 audit[3777]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558e040239c0 a1=4c0fc a2=558e024472b0 a3=5 items=0 ppid=1777 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:26.832185 kernel: FS-Cache: Loaded May 17 00:37:26.778000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.931747 kernel: Failed to create system directory sunrpc May 17 00:37:26.931813 kernel: Failed to create system directory sunrpc May 17 00:37:26.931833 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.934159 kernel: Failed to create system directory sunrpc May 17 00:37:26.934228 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.936461 kernel: Failed to create system directory sunrpc May 17 00:37:26.936523 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.938674 kernel: Failed to create system directory sunrpc May 17 00:37:26.938729 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.939770 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.940864 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.941926 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.943990 kernel: Failed to create system directory sunrpc May 17 00:37:26.944056 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.946047 kernel: Failed to create system directory sunrpc May 17 00:37:26.946113 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.947031 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.948948 kernel: Failed to create system directory sunrpc May 17 00:37:26.949004 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.950768 kernel: Failed to create system directory sunrpc May 17 00:37:26.950823 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.952550 kernel: Failed to create system directory sunrpc May 17 00:37:26.952610 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.953531 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.955446 kernel: Failed to create system directory sunrpc May 17 00:37:26.955498 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.957426 kernel: Failed to create system directory sunrpc May 17 00:37:26.957489 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.959238 kernel: Failed to create system directory sunrpc May 17 00:37:26.959284 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.961068 kernel: Failed to create system directory sunrpc May 17 00:37:26.961126 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.962927 kernel: Failed to create system directory sunrpc May 17 00:37:26.962983 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.964738 kernel: Failed to create system directory sunrpc May 17 00:37:26.964796 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.966525 kernel: Failed to create system directory sunrpc May 17 00:37:26.966574 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.968305 kernel: Failed to create system directory sunrpc May 17 00:37:26.968365 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.970093 kernel: Failed to create system directory sunrpc May 17 00:37:26.970141 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.971920 kernel: Failed to create system directory sunrpc May 17 00:37:26.971963 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.973677 kernel: Failed to create system directory sunrpc May 17 00:37:26.973725 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.975442 kernel: Failed to create system directory sunrpc May 17 00:37:26.975487 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.977230 kernel: Failed to create system directory sunrpc May 17 00:37:26.977282 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.979084 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.982941 kernel: Failed to create system directory sunrpc May 17 00:37:26.982998 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.983941 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.985000 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.986921 kernel: Failed to create system directory sunrpc May 17 00:37:26.986953 kernel: Failed to create system directory sunrpc May 17 00:37:26.986976 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.988609 kernel: Failed to create system directory sunrpc May 17 00:37:26.988667 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.990481 kernel: Failed to create system directory sunrpc May 17 00:37:26.990520 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.992417 kernel: Failed to create system directory sunrpc May 17 00:37:26.992483 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.994287 kernel: Failed to create system directory sunrpc May 17 00:37:26.994350 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.996119 kernel: Failed to create system directory sunrpc May 17 00:37:26.996166 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.997971 kernel: Failed to create system directory sunrpc May 17 00:37:26.998022 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.000772 kernel: Failed to create system directory sunrpc May 17 00:37:27.000867 kernel: Failed to create system directory sunrpc May 17 00:37:27.000916 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.001926 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.002927 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.004752 kernel: Failed to create system directory sunrpc May 17 00:37:27.004800 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.006625 kernel: Failed to create system directory sunrpc May 17 00:37:27.006674 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.008456 kernel: Failed to create system directory sunrpc May 17 00:37:27.008522 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.010295 kernel: Failed to create system directory sunrpc May 17 00:37:27.010355 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.012167 kernel: Failed to create system directory sunrpc May 17 00:37:27.012219 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.014032 kernel: Failed to create system directory sunrpc May 17 00:37:27.014101 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.016737 kernel: Failed to create system directory sunrpc May 17 00:37:27.016795 kernel: Failed to create system directory sunrpc May 17 00:37:27.016823 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.018606 kernel: Failed to create system directory sunrpc May 17 00:37:27.018654 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.020439 kernel: Failed to create system directory sunrpc May 17 00:37:27.020487 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.022379 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.023379 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.024332 kernel: Failed to create system directory sunrpc May 17 00:37:27.024394 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.026263 kernel: Failed to create system directory sunrpc May 17 00:37:27.026318 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.028109 kernel: Failed to create system directory sunrpc May 17 00:37:27.028156 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.029962 kernel: Failed to create system directory sunrpc May 17 00:37:27.030009 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.032767 kernel: Failed to create system directory sunrpc May 17 00:37:27.032821 kernel: Failed to create system directory sunrpc May 17 00:37:27.032849 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.034658 kernel: Failed to create system directory sunrpc May 17 00:37:27.034714 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.036643 kernel: Failed to create system directory sunrpc May 17 00:37:27.036712 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.038576 kernel: Failed to create system directory sunrpc May 17 00:37:27.038639 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.040444 kernel: Failed to create system directory sunrpc May 17 00:37:27.040497 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.042383 kernel: Failed to create system directory sunrpc May 17 00:37:27.042462 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.044269 kernel: Failed to create system directory sunrpc May 17 00:37:27.044337 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.046115 kernel: Failed to create system directory sunrpc May 17 00:37:27.046200 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.048020 kernel: Failed to create system directory sunrpc May 17 00:37:27.048061 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.049985 kernel: Failed to create system directory sunrpc May 17 00:37:27.050041 kernel: Failed to create system directory sunrpc May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:26.914000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.051814 kernel: Failed to create system directory sunrpc May 17 00:37:27.064453 kernel: RPC: Registered named UNIX socket transport module. May 17 00:37:27.064559 kernel: RPC: Registered udp transport module. May 17 00:37:27.064581 kernel: RPC: Registered tcp transport module. May 17 00:37:27.064618 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 17 00:37:26.914000 audit[3777]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558e0406fad0 a1=1a814c a2=558e024472b0 a3=5 items=6 ppid=1777 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:26.914000 audit: CWD cwd="/" May 17 00:37:26.914000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:26.914000 audit: PATH item=1 name=(null) inode=24278 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:26.914000 audit: PATH item=2 name=(null) inode=24278 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:26.914000 audit: PATH item=3 name=(null) inode=24279 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:26.914000 audit: PATH item=4 name=(null) inode=24278 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:26.914000 audit: PATH item=5 name=(null) inode=24280 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:26.914000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.145478 kernel: Failed to create system directory nfs May 17 00:37:27.145540 kernel: Failed to create system directory nfs May 17 00:37:27.145566 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.147284 kernel: Failed to create system directory nfs May 17 00:37:27.147332 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.148220 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.149124 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.150016 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.151824 kernel: Failed to create system directory nfs May 17 00:37:27.151873 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.153631 kernel: Failed to create system directory nfs May 17 00:37:27.153680 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.155375 kernel: Failed to create system directory nfs May 17 00:37:27.155429 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.157178 kernel: Failed to create system directory nfs May 17 00:37:27.157226 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.158988 kernel: Failed to create system directory nfs May 17 00:37:27.159032 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.160733 kernel: Failed to create system directory nfs May 17 00:37:27.160823 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.162575 kernel: Failed to create system directory nfs May 17 00:37:27.162621 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.164444 kernel: Failed to create system directory nfs May 17 00:37:27.164521 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.166253 kernel: Failed to create system directory nfs May 17 00:37:27.166318 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.168030 kernel: Failed to create system directory nfs May 17 00:37:27.168098 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.169795 kernel: Failed to create system directory nfs May 17 00:37:27.169854 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.170792 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.173181 kernel: Failed to create system directory nfs May 17 00:37:27.173255 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.174057 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.175724 kernel: Failed to create system directory nfs May 17 00:37:27.175767 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.177440 kernel: Failed to create system directory nfs May 17 00:37:27.177491 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.179131 kernel: Failed to create system directory nfs May 17 00:37:27.179185 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.181697 kernel: Failed to create system directory nfs May 17 00:37:27.181773 kernel: Failed to create system directory nfs May 17 00:37:27.181802 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.183405 kernel: Failed to create system directory nfs May 17 00:37:27.183447 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.185261 kernel: Failed to create system directory nfs May 17 00:37:27.185309 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.187743 kernel: Failed to create system directory nfs May 17 00:37:27.187783 kernel: Failed to create system directory nfs May 17 00:37:27.187843 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.189444 kernel: Failed to create system directory nfs May 17 00:37:27.189491 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.190281 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.191134 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.192070 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.193783 kernel: Failed to create system directory nfs May 17 00:37:27.193857 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.195505 kernel: Failed to create system directory nfs May 17 00:37:27.195549 kernel: Failed to create system directory nfs May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.132000 audit[3777]: AVC avc: denied { confidentiality } for pid=3777 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.197165 kernel: Failed to create system directory nfs May 17 00:37:27.218989 kernel: FS-Cache: Netfs 'nfs' registered for caching May 17 00:37:27.132000 audit[3777]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558e04290a10 a1=16eae4 a2=558e024472b0 a3=5 items=0 ppid=1777 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.132000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.269631 kernel: Failed to create system directory nfs4 May 17 00:37:27.269713 kernel: Failed to create system directory nfs4 May 17 00:37:27.269745 kernel: Failed to create system directory nfs4 May 17 00:37:27.269765 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.271671 kernel: Failed to create system directory nfs4 May 17 00:37:27.271706 kernel: Failed to create system directory nfs4 May 17 00:37:27.271733 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.273293 kernel: Failed to create system directory nfs4 May 17 00:37:27.273355 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.275688 kernel: Failed to create system directory nfs4 May 17 00:37:27.275720 kernel: Failed to create system directory nfs4 May 17 00:37:27.275736 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.276506 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.277297 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.279676 kernel: Failed to create system directory nfs4 May 17 00:37:27.279733 kernel: Failed to create system directory nfs4 May 17 00:37:27.279752 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.281289 kernel: Failed to create system directory nfs4 May 17 00:37:27.281364 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.282937 kernel: Failed to create system directory nfs4 May 17 00:37:27.282990 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.284523 kernel: Failed to create system directory nfs4 May 17 00:37:27.284585 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.286148 kernel: Failed to create system directory nfs4 May 17 00:37:27.286226 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.288572 kernel: Failed to create system directory nfs4 May 17 00:37:27.288631 kernel: Failed to create system directory nfs4 May 17 00:37:27.288651 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.290419 kernel: Failed to create system directory nfs4 May 17 00:37:27.290495 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.291460 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.293255 kernel: Failed to create system directory nfs4 May 17 00:37:27.293329 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.295090 kernel: Failed to create system directory nfs4 May 17 00:37:27.295160 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.296969 kernel: Failed to create system directory nfs4 May 17 00:37:27.297023 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.298639 kernel: Failed to create system directory nfs4 May 17 00:37:27.298686 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.300399 kernel: Failed to create system directory nfs4 May 17 00:37:27.300448 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.302192 kernel: Failed to create system directory nfs4 May 17 00:37:27.302246 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.303942 kernel: Failed to create system directory nfs4 May 17 00:37:27.303987 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.305665 kernel: Failed to create system directory nfs4 May 17 00:37:27.305712 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.307410 kernel: Failed to create system directory nfs4 May 17 00:37:27.307458 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.309166 kernel: Failed to create system directory nfs4 May 17 00:37:27.309221 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.310937 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.312054 kernel: Failed to create system directory nfs4 May 17 00:37:27.312184 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.314032 kernel: Failed to create system directory nfs4 May 17 00:37:27.314089 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.316606 kernel: Failed to create system directory nfs4 May 17 00:37:27.316651 kernel: Failed to create system directory nfs4 May 17 00:37:27.316680 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.318377 kernel: Failed to create system directory nfs4 May 17 00:37:27.318424 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.320105 kernel: Failed to create system directory nfs4 May 17 00:37:27.320151 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.322751 kernel: Failed to create system directory nfs4 May 17 00:37:27.322796 kernel: Failed to create system directory nfs4 May 17 00:37:27.322831 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.324474 kernel: Failed to create system directory nfs4 May 17 00:37:27.324515 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.325378 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.327656 kernel: Failed to create system directory nfs4 May 17 00:37:27.327732 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.328959 kernel: Failed to create system directory nfs4 May 17 00:37:27.329022 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.330689 kernel: Failed to create system directory nfs4 May 17 00:37:27.330737 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.331581 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.332631 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.334349 kernel: Failed to create system directory nfs4 May 17 00:37:27.334401 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.335211 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.336984 kernel: Failed to create system directory nfs4 May 17 00:37:27.337051 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.338656 kernel: Failed to create system directory nfs4 May 17 00:37:27.338695 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.339526 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.340408 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.342178 kernel: Failed to create system directory nfs4 May 17 00:37:27.342219 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.343059 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.344776 kernel: Failed to create system directory nfs4 May 17 00:37:27.344818 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.345656 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.346524 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.347397 kernel: Failed to create system directory nfs4 May 17 00:37:27.249000 audit[3783]: AVC avc: denied { confidentiality } for pid=3783 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.498513 kernel: NFS: Registering the id_resolver key type May 17 00:37:27.498679 kernel: Key type id_resolver registered May 17 00:37:27.498711 kernel: Key type id_legacy registered May 17 00:37:27.249000 audit[3783]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f05d271d010 a1=209404 a2=5593eeb852b0 a3=5 items=0 ppid=1777 pid=3783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.249000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.516614 kernel: Failed to create system directory rpcgss May 17 00:37:27.516692 kernel: Failed to create system directory rpcgss May 17 00:37:27.516719 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.518505 kernel: Failed to create system directory rpcgss May 17 00:37:27.518558 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.520338 kernel: Failed to create system directory rpcgss May 17 00:37:27.520432 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.524331 kernel: Failed to create system directory rpcgss May 17 00:37:27.524447 kernel: Failed to create system directory rpcgss May 17 00:37:27.524486 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.526446 kernel: Failed to create system directory rpcgss May 17 00:37:27.526521 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.527401 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.528315 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.529248 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.530173 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.531982 kernel: Failed to create system directory rpcgss May 17 00:37:27.532024 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.532992 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.534748 kernel: Failed to create system directory rpcgss May 17 00:37:27.534823 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.536578 kernel: Failed to create system directory rpcgss May 17 00:37:27.536639 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.538417 kernel: Failed to create system directory rpcgss May 17 00:37:27.538477 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.510000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:27.540236 kernel: Failed to create system directory rpcgss May 17 00:37:27.510000 audit[3784]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f2ff3206010 a1=70b64 a2=55596004d2b0 a3=5 items=0 ppid=1777 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.510000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 17 00:37:27.627418 nfsidmap[3792]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' May 17 00:37:27.631578 nfsidmap[3793]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' May 17 00:37:27.642000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2897 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:37:27.642000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2897 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:37:27.642000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2897 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:37:27.642000 audit[1937]: AVC avc: denied { watch_reads } for pid=1937 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2897 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:37:27.642000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=557e52b995f0 a2=10 a3=331fbcd7434a7c61 items=0 ppid=1 pid=1937 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.642000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:37:27.642000 audit[1937]: AVC avc: denied { watch_reads } for pid=1937 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2897 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:37:27.642000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=557e52b995f0 a2=10 a3=331fbcd7434a7c61 items=0 ppid=1 pid=1937 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.642000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:37:27.642000 audit[1937]: AVC avc: denied { watch_reads } for pid=1937 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2897 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:37:27.642000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=557e52b995f0 a2=10 a3=331fbcd7434a7c61 items=0 ppid=1 pid=1937 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.642000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:37:27.663281 kubelet[2125]: E0517 00:37:27.663232 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:27.933519 env[1734]: time="2025-05-17T00:37:27.933474678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:6d40e0cf-491f-4dab-a7dc-f1edf0ef620a,Namespace:default,Attempt:0,}" May 17 00:37:28.425800 (udev-worker)[3778]: Network interface NamePolicy= disabled on kernel command line. May 17 00:37:28.436039 systemd-networkd[1460]: cali5ec59c6bf6e: Link UP May 17 00:37:28.439963 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:37:28.440075 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 17 00:37:28.440345 systemd-networkd[1460]: cali5ec59c6bf6e: Gained carrier May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.073 [INFO][3800] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.24.63-k8s-test--pod--1-eth0 default 6d40e0cf-491f-4dab-a7dc-f1edf0ef620a 1463 0 2025-05-17 00:37:05 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.24.63 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.63-k8s-test--pod--1-" May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.074 [INFO][3800] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.63-k8s-test--pod--1-eth0" May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.110 [INFO][3814] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" HandleID="k8s-pod-network.923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" Workload="172.31.24.63-k8s-test--pod--1-eth0" May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.110 [INFO][3814] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" HandleID="k8s-pod-network.923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" Workload="172.31.24.63-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003255f0), Attrs:map[string]string{"namespace":"default", "node":"172.31.24.63", "pod":"test-pod-1", "timestamp":"2025-05-17 00:37:28.110174327 +0000 UTC"}, Hostname:"172.31.24.63", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.110 [INFO][3814] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.110 [INFO][3814] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.110 [INFO][3814] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.24.63' May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.184 [INFO][3814] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" host="172.31.24.63" May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.212 [INFO][3814] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.24.63" May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.231 [INFO][3814] ipam/ipam.go 511: Trying affinity for 192.168.88.192/26 host="172.31.24.63" May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.271 [INFO][3814] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.192/26 host="172.31.24.63" May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.295 [INFO][3814] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.192/26 host="172.31.24.63" May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.295 [INFO][3814] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.192/26 handle="k8s-pod-network.923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" host="172.31.24.63" May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.341 [INFO][3814] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.356 [INFO][3814] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.192/26 handle="k8s-pod-network.923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" host="172.31.24.63" May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.420 [INFO][3814] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.196/26] block=192.168.88.192/26 handle="k8s-pod-network.923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" host="172.31.24.63" May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.420 [INFO][3814] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.196/26] handle="k8s-pod-network.923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" host="172.31.24.63" May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.420 [INFO][3814] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.420 [INFO][3814] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.196/26] IPv6=[] ContainerID="923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" HandleID="k8s-pod-network.923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" Workload="172.31.24.63-k8s-test--pod--1-eth0" May 17 00:37:28.487942 env[1734]: 2025-05-17 00:37:28.422 [INFO][3800] cni-plugin/k8s.go 418: Populated endpoint ContainerID="923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.63-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.63-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"6d40e0cf-491f-4dab-a7dc-f1edf0ef620a", ResourceVersion:"1463", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.63", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:28.488693 env[1734]: 2025-05-17 00:37:28.422 [INFO][3800] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.196/32] ContainerID="923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.63-k8s-test--pod--1-eth0" May 17 00:37:28.488693 env[1734]: 2025-05-17 00:37:28.422 [INFO][3800] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.63-k8s-test--pod--1-eth0" May 17 00:37:28.488693 env[1734]: 2025-05-17 00:37:28.440 [INFO][3800] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.63-k8s-test--pod--1-eth0" May 17 00:37:28.488693 env[1734]: 2025-05-17 00:37:28.440 [INFO][3800] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.63-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.24.63-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"6d40e0cf-491f-4dab-a7dc-f1edf0ef620a", ResourceVersion:"1463", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.24.63", ContainerID:"923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"32:cb:7a:19:34:96", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:28.488693 env[1734]: 2025-05-17 00:37:28.486 [INFO][3800] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.24.63-k8s-test--pod--1-eth0" May 17 00:37:28.500723 env[1734]: time="2025-05-17T00:37:28.500629810Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:28.500723 env[1734]: time="2025-05-17T00:37:28.500679987Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:28.500723 env[1734]: time="2025-05-17T00:37:28.500690609Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:28.501372 env[1734]: time="2025-05-17T00:37:28.501295531Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf pid=3833 runtime=io.containerd.runc.v2 May 17 00:37:28.525337 systemd[1]: run-containerd-runc-k8s.io-923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf-runc.9EVqpv.mount: Deactivated successfully. May 17 00:37:28.533390 systemd[1]: Started cri-containerd-923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf.scope. May 17 00:37:28.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit: BPF prog-id=132 op=LOAD May 17 00:37:28.555000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3833 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932336263353662626634663362383562316564646661333062616337 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3833 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932336263353662626634663362383562316564646661333062616337 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit: BPF prog-id=133 op=LOAD May 17 00:37:28.555000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003209e0 items=0 ppid=3833 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932336263353662626634663362383562316564646661333062616337 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.555000 audit: BPF prog-id=134 op=LOAD May 17 00:37:28.555000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000320a28 items=0 ppid=3833 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932336263353662626634663362383562316564646661333062616337 May 17 00:37:28.556000 audit: BPF prog-id=134 op=UNLOAD May 17 00:37:28.556000 audit: BPF prog-id=133 op=UNLOAD May 17 00:37:28.556000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.556000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.556000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.556000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.556000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.556000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.556000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.556000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.556000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.556000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.556000 audit: BPF prog-id=135 op=LOAD May 17 00:37:28.556000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000320e38 items=0 ppid=3833 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932336263353662626634663362383562316564646661333062616337 May 17 00:37:28.588437 env[1734]: time="2025-05-17T00:37:28.588389212Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:6d40e0cf-491f-4dab-a7dc-f1edf0ef620a,Namespace:default,Attempt:0,} returns sandbox id \"923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf\"" May 17 00:37:28.590306 env[1734]: time="2025-05-17T00:37:28.590277424Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:37:28.663820 kubelet[2125]: E0517 00:37:28.663757 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:28.865315 env[1734]: time="2025-05-17T00:37:28.865257042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:28.867155 env[1734]: time="2025-05-17T00:37:28.867115562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:28.869005 env[1734]: time="2025-05-17T00:37:28.868966633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:28.873299 env[1734]: time="2025-05-17T00:37:28.873257262Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:37:28.873699 env[1734]: time="2025-05-17T00:37:28.873673131Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:28.878335 env[1734]: time="2025-05-17T00:37:28.878295867Z" level=info msg="CreateContainer within sandbox \"923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 17 00:37:28.901648 env[1734]: time="2025-05-17T00:37:28.901569382Z" level=info msg="CreateContainer within sandbox \"923bc56bbf4f3b85b1eddfa30bac7cc3cd68161a98a9ff7671d40a53e9a80acf\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"7261bba221da1a8a331924ef9aaa9cbb447965ccd9cf2584696c603f9bb8f7bf\"" May 17 00:37:28.902438 env[1734]: time="2025-05-17T00:37:28.902272938Z" level=info msg="StartContainer for \"7261bba221da1a8a331924ef9aaa9cbb447965ccd9cf2584696c603f9bb8f7bf\"" May 17 00:37:28.921623 systemd[1]: Started cri-containerd-7261bba221da1a8a331924ef9aaa9cbb447965ccd9cf2584696c603f9bb8f7bf.scope. May 17 00:37:28.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.938000 audit: BPF prog-id=136 op=LOAD May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3833 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363162626132323164613161386133333139323465663961616139 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3833 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363162626132323164613161386133333139323465663961616139 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit: BPF prog-id=137 op=LOAD May 17 00:37:28.939000 audit[3875]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00040c230 items=0 ppid=3833 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363162626132323164613161386133333139323465663961616139 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit: BPF prog-id=138 op=LOAD May 17 00:37:28.939000 audit[3875]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00040c278 items=0 ppid=3833 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363162626132323164613161386133333139323465663961616139 May 17 00:37:28.939000 audit: BPF prog-id=138 op=UNLOAD May 17 00:37:28.939000 audit: BPF prog-id=137 op=UNLOAD May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.939000 audit: BPF prog-id=139 op=LOAD May 17 00:37:28.939000 audit[3875]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00040c688 items=0 ppid=3833 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363162626132323164613161386133333139323465663961616139 May 17 00:37:28.963853 env[1734]: time="2025-05-17T00:37:28.963344830Z" level=info msg="StartContainer for \"7261bba221da1a8a331924ef9aaa9cbb447965ccd9cf2584696c603f9bb8f7bf\" returns successfully" May 17 00:37:29.026000 audit[3913]: NETFILTER_CFG table=filter:80 family=2 entries=36 op=nft_register_chain pid=3913 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:29.026000 audit[3913]: SYSCALL arch=c000003e syscall=46 success=yes exit=19132 a0=3 a1=7ffef88a46a0 a2=0 a3=7ffef88a468c items=0 ppid=2750 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.026000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:29.596272 kubelet[2125]: E0517 00:37:29.596221 2125 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:29.664375 kubelet[2125]: E0517 00:37:29.664336 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:30.136072 systemd-networkd[1460]: cali5ec59c6bf6e: Gained IPv6LL May 17 00:37:30.664750 kubelet[2125]: E0517 00:37:30.664681 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:31.665721 kubelet[2125]: E0517 00:37:31.665676 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:32.666587 kubelet[2125]: E0517 00:37:32.666543 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:33.667520 kubelet[2125]: E0517 00:37:33.667468 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:34.667659 kubelet[2125]: E0517 00:37:34.667612 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:35.668010 kubelet[2125]: E0517 00:37:35.667932 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:36.668654 kubelet[2125]: E0517 00:37:36.668609 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:37.669567 kubelet[2125]: E0517 00:37:37.669494 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:38.669927 kubelet[2125]: E0517 00:37:38.669830 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:39.670286 kubelet[2125]: E0517 00:37:39.670218 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:40.671034 kubelet[2125]: E0517 00:37:40.670994 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:41.671501 kubelet[2125]: E0517 00:37:41.671455 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:42.671905 kubelet[2125]: E0517 00:37:42.671842 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:43.672666 kubelet[2125]: E0517 00:37:43.672627 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:44.673664 kubelet[2125]: E0517 00:37:44.673609 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:45.674558 kubelet[2125]: E0517 00:37:45.674517 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:46.675588 kubelet[2125]: E0517 00:37:46.675531 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:47.675786 kubelet[2125]: E0517 00:37:47.675705 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:48.676619 kubelet[2125]: E0517 00:37:48.676545 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:49.596470 kubelet[2125]: E0517 00:37:49.596393 2125 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:49.676741 kubelet[2125]: E0517 00:37:49.676702 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:50.677498 kubelet[2125]: E0517 00:37:50.677436 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:51.678042 kubelet[2125]: E0517 00:37:51.677968 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:52.678615 kubelet[2125]: E0517 00:37:52.678553 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:53.679081 kubelet[2125]: E0517 00:37:53.679041 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:54.679847 kubelet[2125]: E0517 00:37:54.679788 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:55.680801 kubelet[2125]: E0517 00:37:55.680726 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:56.681962 kubelet[2125]: E0517 00:37:56.681917 2125 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"