May 17 00:42:49.102701 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:42:49.102758 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:42:49.102776 kernel: BIOS-provided physical RAM map: May 17 00:42:49.102785 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 17 00:42:49.102795 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 17 00:42:49.102802 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 17 00:42:49.102810 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable May 17 00:42:49.102817 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved May 17 00:42:49.102828 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 17 00:42:49.102834 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 17 00:42:49.102841 kernel: NX (Execute Disable) protection: active May 17 00:42:49.102848 kernel: SMBIOS 2.8 present. May 17 00:42:49.102855 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 17 00:42:49.102862 kernel: Hypervisor detected: KVM May 17 00:42:49.102871 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:42:49.102885 kernel: kvm-clock: cpu 0, msr 4d19a001, primary cpu clock May 17 00:42:49.102895 kernel: kvm-clock: using sched offset of 3938109355 cycles May 17 00:42:49.102907 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:42:49.102921 kernel: tsc: Detected 2494.146 MHz processor May 17 00:42:49.102933 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:42:49.102944 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:42:49.102955 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 May 17 00:42:49.102966 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:42:49.102981 kernel: ACPI: Early table checksum verification disabled May 17 00:42:49.102992 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) May 17 00:42:49.102999 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:49.103007 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:49.103014 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:49.103022 kernel: ACPI: FACS 0x000000007FFE0000 000040 May 17 00:42:49.103030 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:49.103037 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:49.103045 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:49.103056 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:42:49.103063 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] May 17 00:42:49.103071 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] May 17 00:42:49.103078 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] May 17 00:42:49.103085 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] May 17 00:42:49.103093 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] May 17 00:42:49.103100 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] May 17 00:42:49.103108 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] May 17 00:42:49.103123 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:42:49.103131 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:42:49.103139 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 17 00:42:49.103148 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 17 00:42:49.103156 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00000000-0x7ffdafff] May 17 00:42:49.103164 kernel: NODE_DATA(0) allocated [mem 0x7ffd5000-0x7ffdafff] May 17 00:42:49.103176 kernel: Zone ranges: May 17 00:42:49.103184 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:42:49.103192 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] May 17 00:42:49.103200 kernel: Normal empty May 17 00:42:49.103208 kernel: Movable zone start for each node May 17 00:42:49.103216 kernel: Early memory node ranges May 17 00:42:49.103225 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 17 00:42:49.103233 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] May 17 00:42:49.103241 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] May 17 00:42:49.103252 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:42:49.103263 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 17 00:42:49.103272 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges May 17 00:42:49.103280 kernel: ACPI: PM-Timer IO Port: 0x608 May 17 00:42:49.103288 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:42:49.103296 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 17 00:42:49.103304 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 17 00:42:49.103312 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:42:49.103320 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:42:49.103331 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:42:49.103342 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:42:49.103350 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:42:49.103358 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 17 00:42:49.103366 kernel: TSC deadline timer available May 17 00:42:49.103377 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:42:49.103393 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices May 17 00:42:49.103404 kernel: Booting paravirtualized kernel on KVM May 17 00:42:49.103415 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:42:49.103433 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:42:49.103444 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:42:49.103455 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:42:49.103467 kernel: pcpu-alloc: [0] 0 1 May 17 00:42:49.103479 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 May 17 00:42:49.103490 kernel: kvm-guest: PV spinlocks disabled, no host support May 17 00:42:49.103501 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515803 May 17 00:42:49.103513 kernel: Policy zone: DMA32 May 17 00:42:49.103524 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:42:49.103536 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:42:49.103544 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:42:49.103553 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:42:49.103562 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:42:49.103571 kernel: Memory: 1973276K/2096612K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 123076K reserved, 0K cma-reserved) May 17 00:42:49.103579 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:42:49.103587 kernel: Kernel/User page tables isolation: enabled May 17 00:42:49.103595 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:42:49.103607 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:42:49.103616 kernel: rcu: Hierarchical RCU implementation. May 17 00:42:49.103625 kernel: rcu: RCU event tracing is enabled. May 17 00:42:49.103634 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:42:49.103642 kernel: Rude variant of Tasks RCU enabled. May 17 00:42:49.107740 kernel: Tracing variant of Tasks RCU enabled. May 17 00:42:49.107754 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:42:49.107764 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:42:49.107773 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 17 00:42:49.107791 kernel: random: crng init done May 17 00:42:49.107800 kernel: Console: colour VGA+ 80x25 May 17 00:42:49.107808 kernel: printk: console [tty0] enabled May 17 00:42:49.107817 kernel: printk: console [ttyS0] enabled May 17 00:42:49.107825 kernel: ACPI: Core revision 20210730 May 17 00:42:49.107834 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 17 00:42:49.107843 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:42:49.107852 kernel: x2apic enabled May 17 00:42:49.107860 kernel: Switched APIC routing to physical x2apic. May 17 00:42:49.107868 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 17 00:42:49.107880 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39fcb9af, max_idle_ns: 440795211412 ns May 17 00:42:49.107888 kernel: Calibrating delay loop (skipped) preset value.. 4988.29 BogoMIPS (lpj=2494146) May 17 00:42:49.107905 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 17 00:42:49.107914 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 17 00:42:49.107923 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:42:49.107931 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:42:49.107940 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:42:49.107948 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls May 17 00:42:49.107959 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 00:42:49.107976 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 00:42:49.107985 kernel: MDS: Mitigation: Clear CPU buffers May 17 00:42:49.107997 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:42:49.108007 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:42:49.108015 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:42:49.108024 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:42:49.108033 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:42:49.108042 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 17 00:42:49.108051 kernel: Freeing SMP alternatives memory: 32K May 17 00:42:49.108063 kernel: pid_max: default: 32768 minimum: 301 May 17 00:42:49.108072 kernel: LSM: Security Framework initializing May 17 00:42:49.108083 kernel: SELinux: Initializing. May 17 00:42:49.108096 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:42:49.108105 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:42:49.108114 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) May 17 00:42:49.108123 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. May 17 00:42:49.108136 kernel: signal: max sigframe size: 1776 May 17 00:42:49.108148 kernel: rcu: Hierarchical SRCU implementation. May 17 00:42:49.108162 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:42:49.108173 kernel: smp: Bringing up secondary CPUs ... May 17 00:42:49.108186 kernel: x86: Booting SMP configuration: May 17 00:42:49.108196 kernel: .... node #0, CPUs: #1 May 17 00:42:49.108205 kernel: kvm-clock: cpu 1, msr 4d19a041, secondary cpu clock May 17 00:42:49.108214 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 May 17 00:42:49.108223 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:42:49.108236 kernel: smpboot: Max logical packages: 1 May 17 00:42:49.108245 kernel: smpboot: Total of 2 processors activated (9976.58 BogoMIPS) May 17 00:42:49.108253 kernel: devtmpfs: initialized May 17 00:42:49.108262 kernel: x86/mm: Memory block size: 128MB May 17 00:42:49.108271 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:42:49.108280 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:42:49.108289 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:42:49.108298 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:42:49.108306 kernel: audit: initializing netlink subsys (disabled) May 17 00:42:49.108318 kernel: audit: type=2000 audit(1747442567.471:1): state=initialized audit_enabled=0 res=1 May 17 00:42:49.108327 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:42:49.108336 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:42:49.108345 kernel: cpuidle: using governor menu May 17 00:42:49.108353 kernel: ACPI: bus type PCI registered May 17 00:42:49.108362 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:42:49.108374 kernel: dca service started, version 1.12.1 May 17 00:42:49.108383 kernel: PCI: Using configuration type 1 for base access May 17 00:42:49.108391 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:42:49.108404 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:42:49.108413 kernel: ACPI: Added _OSI(Module Device) May 17 00:42:49.108422 kernel: ACPI: Added _OSI(Processor Device) May 17 00:42:49.108431 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:42:49.108440 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:42:49.108448 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:42:49.108457 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:42:49.108466 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:42:49.108474 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:42:49.108486 kernel: ACPI: Interpreter enabled May 17 00:42:49.108494 kernel: ACPI: PM: (supports S0 S5) May 17 00:42:49.108503 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:42:49.108512 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:42:49.108521 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 17 00:42:49.108530 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:42:49.108790 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 17 00:42:49.108892 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 17 00:42:49.108907 kernel: acpiphp: Slot [3] registered May 17 00:42:49.108917 kernel: acpiphp: Slot [4] registered May 17 00:42:49.108926 kernel: acpiphp: Slot [5] registered May 17 00:42:49.108934 kernel: acpiphp: Slot [6] registered May 17 00:42:49.108943 kernel: acpiphp: Slot [7] registered May 17 00:42:49.108953 kernel: acpiphp: Slot [8] registered May 17 00:42:49.108965 kernel: acpiphp: Slot [9] registered May 17 00:42:49.108977 kernel: acpiphp: Slot [10] registered May 17 00:42:49.108990 kernel: acpiphp: Slot [11] registered May 17 00:42:49.109006 kernel: acpiphp: Slot [12] registered May 17 00:42:49.109019 kernel: acpiphp: Slot [13] registered May 17 00:42:49.109031 kernel: acpiphp: Slot [14] registered May 17 00:42:49.109044 kernel: acpiphp: Slot [15] registered May 17 00:42:49.109056 kernel: acpiphp: Slot [16] registered May 17 00:42:49.109067 kernel: acpiphp: Slot [17] registered May 17 00:42:49.109079 kernel: acpiphp: Slot [18] registered May 17 00:42:49.109091 kernel: acpiphp: Slot [19] registered May 17 00:42:49.109103 kernel: acpiphp: Slot [20] registered May 17 00:42:49.109120 kernel: acpiphp: Slot [21] registered May 17 00:42:49.109132 kernel: acpiphp: Slot [22] registered May 17 00:42:49.109144 kernel: acpiphp: Slot [23] registered May 17 00:42:49.109156 kernel: acpiphp: Slot [24] registered May 17 00:42:49.109170 kernel: acpiphp: Slot [25] registered May 17 00:42:49.109184 kernel: acpiphp: Slot [26] registered May 17 00:42:49.109195 kernel: acpiphp: Slot [27] registered May 17 00:42:49.109206 kernel: acpiphp: Slot [28] registered May 17 00:42:49.109219 kernel: acpiphp: Slot [29] registered May 17 00:42:49.109231 kernel: acpiphp: Slot [30] registered May 17 00:42:49.109251 kernel: acpiphp: Slot [31] registered May 17 00:42:49.109263 kernel: PCI host bridge to bus 0000:00 May 17 00:42:49.109457 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:42:49.109552 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:42:49.109665 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:42:49.109748 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 17 00:42:49.109831 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] May 17 00:42:49.109917 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:42:49.110094 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 17 00:42:49.110261 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 17 00:42:49.110427 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 17 00:42:49.110555 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] May 17 00:42:49.110674 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 17 00:42:49.110787 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 17 00:42:49.110897 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 17 00:42:49.110989 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 17 00:42:49.111098 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 May 17 00:42:49.111191 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] May 17 00:42:49.111314 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 17 00:42:49.111410 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 17 00:42:49.111530 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 17 00:42:49.111740 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 17 00:42:49.111843 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 17 00:42:49.111943 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] May 17 00:42:49.112035 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] May 17 00:42:49.112123 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] May 17 00:42:49.112211 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:42:49.112327 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 17 00:42:49.112419 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] May 17 00:42:49.112515 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] May 17 00:42:49.112607 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] May 17 00:42:49.112784 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 17 00:42:49.112920 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] May 17 00:42:49.113058 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] May 17 00:42:49.113167 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] May 17 00:42:49.113287 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 May 17 00:42:49.113379 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] May 17 00:42:49.113504 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] May 17 00:42:49.117007 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] May 17 00:42:49.117250 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 May 17 00:42:49.117415 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] May 17 00:42:49.117540 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] May 17 00:42:49.117741 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] May 17 00:42:49.117868 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 May 17 00:42:49.117995 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] May 17 00:42:49.118139 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] May 17 00:42:49.118278 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] May 17 00:42:49.118433 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 May 17 00:42:49.118569 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] May 17 00:42:49.120804 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] May 17 00:42:49.120847 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:42:49.120857 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:42:49.120867 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:42:49.120876 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:42:49.120896 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 17 00:42:49.120905 kernel: iommu: Default domain type: Translated May 17 00:42:49.120915 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:42:49.121067 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 17 00:42:49.121172 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:42:49.121342 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 17 00:42:49.121357 kernel: vgaarb: loaded May 17 00:42:49.121367 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:42:49.121376 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:42:49.121392 kernel: PTP clock support registered May 17 00:42:49.121401 kernel: PCI: Using ACPI for IRQ routing May 17 00:42:49.121410 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:42:49.121420 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 17 00:42:49.121429 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] May 17 00:42:49.121439 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 17 00:42:49.121448 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 17 00:42:49.121457 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:42:49.121466 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:42:49.121486 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:42:49.121496 kernel: pnp: PnP ACPI init May 17 00:42:49.121505 kernel: pnp: PnP ACPI: found 4 devices May 17 00:42:49.121514 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:42:49.121523 kernel: NET: Registered PF_INET protocol family May 17 00:42:49.121532 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:42:49.121546 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 17 00:42:49.121560 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:42:49.121577 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:42:49.121589 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 17 00:42:49.121601 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 17 00:42:49.121614 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:42:49.121627 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:42:49.121640 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:42:49.125743 kernel: NET: Registered PF_XDP protocol family May 17 00:42:49.126025 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:42:49.126362 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:42:49.126509 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:42:49.126625 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 17 00:42:49.126765 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] May 17 00:42:49.126935 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 17 00:42:49.127049 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:42:49.127142 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 17 00:42:49.127156 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 17 00:42:49.127254 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x740 took 42458 usecs May 17 00:42:49.127274 kernel: PCI: CLS 0 bytes, default 64 May 17 00:42:49.127284 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:42:49.127294 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39fcb9af, max_idle_ns: 440795211412 ns May 17 00:42:49.127304 kernel: Initialise system trusted keyrings May 17 00:42:49.127313 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 17 00:42:49.127322 kernel: Key type asymmetric registered May 17 00:42:49.127332 kernel: Asymmetric key parser 'x509' registered May 17 00:42:49.127340 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:42:49.127349 kernel: io scheduler mq-deadline registered May 17 00:42:49.127364 kernel: io scheduler kyber registered May 17 00:42:49.127379 kernel: io scheduler bfq registered May 17 00:42:49.127392 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:42:49.127405 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 17 00:42:49.127417 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 17 00:42:49.127429 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 17 00:42:49.127442 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:42:49.127453 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:42:49.127463 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:42:49.127477 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:42:49.127486 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:42:49.127495 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:42:49.127716 kernel: rtc_cmos 00:03: RTC can wake from S4 May 17 00:42:49.127879 kernel: rtc_cmos 00:03: registered as rtc0 May 17 00:42:49.127984 kernel: rtc_cmos 00:03: setting system clock to 2025-05-17T00:42:48 UTC (1747442568) May 17 00:42:49.128071 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram May 17 00:42:49.128090 kernel: intel_pstate: CPU model not supported May 17 00:42:49.128100 kernel: NET: Registered PF_INET6 protocol family May 17 00:42:49.128109 kernel: Segment Routing with IPv6 May 17 00:42:49.128118 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:42:49.128128 kernel: NET: Registered PF_PACKET protocol family May 17 00:42:49.128137 kernel: Key type dns_resolver registered May 17 00:42:49.128147 kernel: IPI shorthand broadcast: enabled May 17 00:42:49.128156 kernel: sched_clock: Marking stable (672152238, 93287123)->(886517225, -121077864) May 17 00:42:49.128165 kernel: registered taskstats version 1 May 17 00:42:49.128174 kernel: Loading compiled-in X.509 certificates May 17 00:42:49.128187 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:42:49.128196 kernel: Key type .fscrypt registered May 17 00:42:49.128205 kernel: Key type fscrypt-provisioning registered May 17 00:42:49.128229 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:42:49.128242 kernel: ima: Allocated hash algorithm: sha1 May 17 00:42:49.128255 kernel: ima: No architecture policies found May 17 00:42:49.128264 kernel: clk: Disabling unused clocks May 17 00:42:49.128273 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:42:49.128286 kernel: Write protecting the kernel read-only data: 28672k May 17 00:42:49.128299 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:42:49.128310 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:42:49.128322 kernel: Run /init as init process May 17 00:42:49.128337 kernel: with arguments: May 17 00:42:49.128351 kernel: /init May 17 00:42:49.128394 kernel: with environment: May 17 00:42:49.128411 kernel: HOME=/ May 17 00:42:49.128426 kernel: TERM=linux May 17 00:42:49.128435 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:42:49.128453 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:42:49.128466 systemd[1]: Detected virtualization kvm. May 17 00:42:49.128477 systemd[1]: Detected architecture x86-64. May 17 00:42:49.128487 systemd[1]: Running in initrd. May 17 00:42:49.128504 systemd[1]: No hostname configured, using default hostname. May 17 00:42:49.128515 systemd[1]: Hostname set to . May 17 00:42:49.128525 systemd[1]: Initializing machine ID from VM UUID. May 17 00:42:49.128539 systemd[1]: Queued start job for default target initrd.target. May 17 00:42:49.128549 systemd[1]: Started systemd-ask-password-console.path. May 17 00:42:49.128558 systemd[1]: Reached target cryptsetup.target. May 17 00:42:49.128568 systemd[1]: Reached target paths.target. May 17 00:42:49.128580 systemd[1]: Reached target slices.target. May 17 00:42:49.128594 systemd[1]: Reached target swap.target. May 17 00:42:49.128608 systemd[1]: Reached target timers.target. May 17 00:42:49.128622 systemd[1]: Listening on iscsid.socket. May 17 00:42:49.128631 systemd[1]: Listening on iscsiuio.socket. May 17 00:42:49.128641 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:42:49.128679 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:42:49.128690 systemd[1]: Listening on systemd-journald.socket. May 17 00:42:49.128700 systemd[1]: Listening on systemd-networkd.socket. May 17 00:42:49.128710 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:42:49.128720 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:42:49.128731 systemd[1]: Reached target sockets.target. May 17 00:42:49.128749 systemd[1]: Starting kmod-static-nodes.service... May 17 00:42:49.128759 systemd[1]: Finished network-cleanup.service. May 17 00:42:49.128772 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:42:49.128782 systemd[1]: Starting systemd-journald.service... May 17 00:42:49.128794 systemd[1]: Starting systemd-modules-load.service... May 17 00:42:49.128804 systemd[1]: Starting systemd-resolved.service... May 17 00:42:49.128818 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:42:49.128828 systemd[1]: Finished kmod-static-nodes.service. May 17 00:42:49.128838 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:42:49.128863 systemd-journald[185]: Journal started May 17 00:42:49.128961 systemd-journald[185]: Runtime Journal (/run/log/journal/c0cce03ea2fc4f128bc61cc717d30a96) is 4.9M, max 39.5M, 34.5M free. May 17 00:42:49.115929 systemd-modules-load[186]: Inserted module 'overlay' May 17 00:42:49.136593 systemd-resolved[187]: Positive Trust Anchors: May 17 00:42:49.153666 systemd[1]: Started systemd-journald.service. May 17 00:42:49.153705 kernel: audit: type=1130 audit(1747442569.148:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.136604 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:42:49.171473 kernel: audit: type=1130 audit(1747442569.153:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.171521 kernel: audit: type=1130 audit(1747442569.162:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.136637 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:42:49.175856 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:42:49.175886 kernel: audit: type=1130 audit(1747442569.174:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.140276 systemd-resolved[187]: Defaulting to hostname 'linux'. May 17 00:42:49.154386 systemd[1]: Started systemd-resolved.service. May 17 00:42:49.188696 kernel: Bridge firewalling registered May 17 00:42:49.163085 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:42:49.175760 systemd[1]: Reached target nss-lookup.target. May 17 00:42:49.180040 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:42:49.183748 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:42:49.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.191291 systemd-modules-load[186]: Inserted module 'br_netfilter' May 17 00:42:49.204429 kernel: audit: type=1130 audit(1747442569.200:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.200672 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:42:49.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.208337 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:42:49.215031 kernel: audit: type=1130 audit(1747442569.208:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.210569 systemd[1]: Starting dracut-cmdline.service... May 17 00:42:49.224733 kernel: SCSI subsystem initialized May 17 00:42:49.226517 dracut-cmdline[202]: dracut-dracut-053 May 17 00:42:49.230797 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:42:49.237800 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:42:49.237885 kernel: device-mapper: uevent: version 1.0.3 May 17 00:42:49.245621 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:42:49.249366 systemd-modules-load[186]: Inserted module 'dm_multipath' May 17 00:42:49.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.251371 systemd[1]: Finished systemd-modules-load.service. May 17 00:42:49.254828 kernel: audit: type=1130 audit(1747442569.251:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.255317 systemd[1]: Starting systemd-sysctl.service... May 17 00:42:49.266466 systemd[1]: Finished systemd-sysctl.service. May 17 00:42:49.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.271731 kernel: audit: type=1130 audit(1747442569.267:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.336710 kernel: Loading iSCSI transport class v2.0-870. May 17 00:42:49.357697 kernel: iscsi: registered transport (tcp) May 17 00:42:49.383683 kernel: iscsi: registered transport (qla4xxx) May 17 00:42:49.383772 kernel: QLogic iSCSI HBA Driver May 17 00:42:49.430563 systemd[1]: Finished dracut-cmdline.service. May 17 00:42:49.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.435700 kernel: audit: type=1130 audit(1747442569.430:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.433899 systemd[1]: Starting dracut-pre-udev.service... May 17 00:42:49.495747 kernel: raid6: avx2x4 gen() 15350 MB/s May 17 00:42:49.512722 kernel: raid6: avx2x4 xor() 8816 MB/s May 17 00:42:49.529742 kernel: raid6: avx2x2 gen() 15125 MB/s May 17 00:42:49.546733 kernel: raid6: avx2x2 xor() 18503 MB/s May 17 00:42:49.563734 kernel: raid6: avx2x1 gen() 11414 MB/s May 17 00:42:49.580721 kernel: raid6: avx2x1 xor() 14971 MB/s May 17 00:42:49.597721 kernel: raid6: sse2x4 gen() 11260 MB/s May 17 00:42:49.614727 kernel: raid6: sse2x4 xor() 6559 MB/s May 17 00:42:49.631727 kernel: raid6: sse2x2 gen() 11269 MB/s May 17 00:42:49.648719 kernel: raid6: sse2x2 xor() 8020 MB/s May 17 00:42:49.665723 kernel: raid6: sse2x1 gen() 11264 MB/s May 17 00:42:49.682936 kernel: raid6: sse2x1 xor() 5940 MB/s May 17 00:42:49.683030 kernel: raid6: using algorithm avx2x4 gen() 15350 MB/s May 17 00:42:49.683050 kernel: raid6: .... xor() 8816 MB/s, rmw enabled May 17 00:42:49.684097 kernel: raid6: using avx2x2 recovery algorithm May 17 00:42:49.698681 kernel: xor: automatically using best checksumming function avx May 17 00:42:49.809698 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:42:49.824231 systemd[1]: Finished dracut-pre-udev.service. May 17 00:42:49.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.824000 audit: BPF prog-id=7 op=LOAD May 17 00:42:49.824000 audit: BPF prog-id=8 op=LOAD May 17 00:42:49.825901 systemd[1]: Starting systemd-udevd.service... May 17 00:42:49.846700 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 17 00:42:49.853616 systemd[1]: Started systemd-udevd.service. May 17 00:42:49.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.859409 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:42:49.876625 dracut-pre-trigger[400]: rd.md=0: removing MD RAID activation May 17 00:42:49.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.924991 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:42:49.926868 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:42:49.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:49.980674 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:42:50.043686 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:42:50.053729 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) May 17 00:42:50.118549 kernel: scsi host0: Virtio SCSI HBA May 17 00:42:50.118789 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:42:50.118812 kernel: GPT:9289727 != 125829119 May 17 00:42:50.118830 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:42:50.118845 kernel: libata version 3.00 loaded. May 17 00:42:50.118863 kernel: GPT:9289727 != 125829119 May 17 00:42:50.118878 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:42:50.118899 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:42:50.118915 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:42:50.118932 kernel: AES CTR mode by8 optimization enabled May 17 00:42:50.118948 kernel: ata_piix 0000:00:01.1: version 2.13 May 17 00:42:50.119126 kernel: scsi host1: ata_piix May 17 00:42:50.119303 kernel: scsi host2: ata_piix May 17 00:42:50.119475 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 May 17 00:42:50.119494 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 May 17 00:42:50.122438 kernel: virtio_blk virtio5: [vdb] 932 512-byte logical blocks (477 kB/466 KiB) May 17 00:42:50.150682 kernel: ACPI: bus type USB registered May 17 00:42:50.151676 kernel: usbcore: registered new interface driver usbfs May 17 00:42:50.151723 kernel: usbcore: registered new interface driver hub May 17 00:42:50.151737 kernel: usbcore: registered new device driver usb May 17 00:42:50.298683 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (442) May 17 00:42:50.309685 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver May 17 00:42:50.310123 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:42:50.322085 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:42:50.323315 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:42:50.327688 kernel: ehci-pci: EHCI PCI platform driver May 17 00:42:50.328937 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:42:50.330917 systemd[1]: Starting disk-uuid.service... May 17 00:42:50.345327 kernel: uhci_hcd: USB Universal Host Controller Interface driver May 17 00:42:50.344588 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:42:50.346159 disk-uuid[512]: Primary Header is updated. May 17 00:42:50.346159 disk-uuid[512]: Secondary Entries is updated. May 17 00:42:50.346159 disk-uuid[512]: Secondary Header is updated. May 17 00:42:50.352681 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:42:50.357123 kernel: GPT:disk_guids don't match. May 17 00:42:50.357221 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:42:50.357242 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:42:50.377528 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller May 17 00:42:50.382640 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 May 17 00:42:50.382920 kernel: uhci_hcd 0000:00:01.2: detected 2 ports May 17 00:42:50.383099 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 May 17 00:42:50.383273 kernel: hub 1-0:1.0: USB hub found May 17 00:42:50.383491 kernel: hub 1-0:1.0: 2 ports detected May 17 00:42:51.361807 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:42:51.361885 disk-uuid[516]: The operation has completed successfully. May 17 00:42:51.414912 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:42:51.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:51.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:51.415063 systemd[1]: Finished disk-uuid.service. May 17 00:42:51.416616 systemd[1]: Starting verity-setup.service... May 17 00:42:51.437848 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:42:51.485859 systemd[1]: Found device dev-mapper-usr.device. May 17 00:42:51.488327 systemd[1]: Mounting sysusr-usr.mount... May 17 00:42:51.491542 systemd[1]: Finished verity-setup.service. May 17 00:42:51.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:51.578703 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:42:51.579905 systemd[1]: Mounted sysusr-usr.mount. May 17 00:42:51.580459 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:42:51.581355 systemd[1]: Starting ignition-setup.service... May 17 00:42:51.582896 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:42:51.601234 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:42:51.601312 kernel: BTRFS info (device vda6): using free space tree May 17 00:42:51.601343 kernel: BTRFS info (device vda6): has skinny extents May 17 00:42:51.617416 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:42:51.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:51.624829 systemd[1]: Finished ignition-setup.service. May 17 00:42:51.626297 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:42:51.779922 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:42:51.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:51.782000 audit: BPF prog-id=9 op=LOAD May 17 00:42:51.783997 systemd[1]: Starting systemd-networkd.service... May 17 00:42:51.823413 systemd-networkd[690]: lo: Link UP May 17 00:42:51.823425 systemd-networkd[690]: lo: Gained carrier May 17 00:42:51.824701 systemd-networkd[690]: Enumeration completed May 17 00:42:51.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:51.825277 systemd[1]: Started systemd-networkd.service. May 17 00:42:51.825607 systemd-networkd[690]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:42:51.825773 systemd[1]: Reached target network.target. May 17 00:42:51.827605 systemd[1]: Starting iscsiuio.service... May 17 00:42:51.834508 systemd-networkd[690]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. May 17 00:42:51.842672 systemd-networkd[690]: eth1: Link UP May 17 00:42:51.842684 systemd-networkd[690]: eth1: Gained carrier May 17 00:42:51.846135 systemd-networkd[690]: eth0: Link UP May 17 00:42:51.846146 systemd-networkd[690]: eth0: Gained carrier May 17 00:42:51.851103 systemd[1]: Started iscsiuio.service. May 17 00:42:51.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:51.852924 systemd[1]: Starting iscsid.service... May 17 00:42:51.860769 iscsid[695]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:42:51.860769 iscsid[695]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:42:51.860769 iscsid[695]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:42:51.860769 iscsid[695]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:42:51.860769 iscsid[695]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:42:51.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:51.879135 iscsid[695]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:42:51.864356 systemd[1]: Started iscsid.service. May 17 00:42:51.871030 systemd-networkd[690]: eth1: DHCPv4 address 10.124.0.16/20 acquired from 169.254.169.253 May 17 00:42:51.877031 systemd[1]: Starting dracut-initqueue.service... May 17 00:42:51.881856 systemd-networkd[690]: eth0: DHCPv4 address 137.184.33.91/20, gateway 137.184.32.1 acquired from 169.254.169.253 May 17 00:42:51.900088 ignition[622]: Ignition 2.14.0 May 17 00:42:51.900106 ignition[622]: Stage: fetch-offline May 17 00:42:51.900212 ignition[622]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:51.900247 ignition[622]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:51.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:51.903259 systemd[1]: Finished dracut-initqueue.service. May 17 00:42:51.903945 systemd[1]: Reached target remote-fs-pre.target. May 17 00:42:51.904304 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:42:51.904787 systemd[1]: Reached target remote-fs.target. May 17 00:42:51.908830 ignition[622]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:51.908623 systemd[1]: Starting dracut-pre-mount.service... May 17 00:42:51.911121 ignition[622]: parsed url from cmdline: "" May 17 00:42:51.911132 ignition[622]: no config URL provided May 17 00:42:51.911144 ignition[622]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:42:51.911159 ignition[622]: no config at "/usr/lib/ignition/user.ign" May 17 00:42:51.911167 ignition[622]: failed to fetch config: resource requires networking May 17 00:42:51.911337 ignition[622]: Ignition finished successfully May 17 00:42:51.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:51.915227 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:42:51.917103 systemd[1]: Starting ignition-fetch.service... May 17 00:42:51.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:51.924214 systemd[1]: Finished dracut-pre-mount.service. May 17 00:42:51.936025 ignition[706]: Ignition 2.14.0 May 17 00:42:51.936042 ignition[706]: Stage: fetch May 17 00:42:51.936281 ignition[706]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:51.936314 ignition[706]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:51.939512 ignition[706]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:51.939681 ignition[706]: parsed url from cmdline: "" May 17 00:42:51.939685 ignition[706]: no config URL provided May 17 00:42:51.939692 ignition[706]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:42:51.939702 ignition[706]: no config at "/usr/lib/ignition/user.ign" May 17 00:42:51.939739 ignition[706]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 May 17 00:42:51.977093 ignition[706]: GET result: OK May 17 00:42:51.977229 ignition[706]: parsing config with SHA512: 107b1e0941c0cb44cb977fa6b7f93fa57ab70ebc8bdf6367b47d4ee2d0c2ea54b2a75550f08a646004fd2194ce1705971431aa11c2d6197fd5a5e5c3f7e8e19f May 17 00:42:51.986498 unknown[706]: fetched base config from "system" May 17 00:42:51.986923 ignition[706]: fetch: fetch complete May 17 00:42:51.986515 unknown[706]: fetched base config from "system" May 17 00:42:51.986930 ignition[706]: fetch: fetch passed May 17 00:42:51.986524 unknown[706]: fetched user config from "digitalocean" May 17 00:42:51.986984 ignition[706]: Ignition finished successfully May 17 00:42:51.989976 systemd[1]: Finished ignition-fetch.service. May 17 00:42:51.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:51.991877 systemd[1]: Starting ignition-kargs.service... May 17 00:42:52.005635 ignition[715]: Ignition 2.14.0 May 17 00:42:52.005672 ignition[715]: Stage: kargs May 17 00:42:52.005930 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:52.005964 ignition[715]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:52.008762 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:52.010220 ignition[715]: kargs: kargs passed May 17 00:42:52.010306 ignition[715]: Ignition finished successfully May 17 00:42:52.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:52.011671 systemd[1]: Finished ignition-kargs.service. May 17 00:42:52.014697 systemd[1]: Starting ignition-disks.service... May 17 00:42:52.032710 ignition[720]: Ignition 2.14.0 May 17 00:42:52.032725 ignition[720]: Stage: disks May 17 00:42:52.032960 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:52.032991 ignition[720]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:52.036199 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:52.037850 ignition[720]: disks: disks passed May 17 00:42:52.037948 ignition[720]: Ignition finished successfully May 17 00:42:52.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:52.038861 systemd[1]: Finished ignition-disks.service. May 17 00:42:52.039806 systemd[1]: Reached target initrd-root-device.target. May 17 00:42:52.040322 systemd[1]: Reached target local-fs-pre.target. May 17 00:42:52.041162 systemd[1]: Reached target local-fs.target. May 17 00:42:52.041839 systemd[1]: Reached target sysinit.target. May 17 00:42:52.042562 systemd[1]: Reached target basic.target. May 17 00:42:52.044267 systemd[1]: Starting systemd-fsck-root.service... May 17 00:42:52.064549 systemd-fsck[727]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 17 00:42:52.067210 systemd[1]: Finished systemd-fsck-root.service. May 17 00:42:52.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:52.068789 systemd[1]: Mounting sysroot.mount... May 17 00:42:52.084682 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:42:52.085542 systemd[1]: Mounted sysroot.mount. May 17 00:42:52.086329 systemd[1]: Reached target initrd-root-fs.target. May 17 00:42:52.088926 systemd[1]: Mounting sysroot-usr.mount... May 17 00:42:52.090547 systemd[1]: Starting flatcar-digitalocean-network.service... May 17 00:42:52.092466 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 00:42:52.093002 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:42:52.093066 systemd[1]: Reached target ignition-diskful.target. May 17 00:42:52.098123 systemd[1]: Mounted sysroot-usr.mount. May 17 00:42:52.102187 systemd[1]: Starting initrd-setup-root.service... May 17 00:42:52.112308 initrd-setup-root[739]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:42:52.130579 initrd-setup-root[747]: cut: /sysroot/etc/group: No such file or directory May 17 00:42:52.140891 initrd-setup-root[755]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:42:52.147109 initrd-setup-root[765]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:42:52.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:52.231241 systemd[1]: Finished initrd-setup-root.service. May 17 00:42:52.233509 systemd[1]: Starting ignition-mount.service... May 17 00:42:52.235472 systemd[1]: Starting sysroot-boot.service... May 17 00:42:52.248283 bash[784]: umount: /sysroot/usr/share/oem: not mounted. May 17 00:42:52.259573 coreos-metadata[734]: May 17 00:42:52.259 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:42:52.273670 coreos-metadata[733]: May 17 00:42:52.273 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:42:52.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:52.282138 systemd[1]: Finished sysroot-boot.service. May 17 00:42:52.283775 ignition[786]: INFO : Ignition 2.14.0 May 17 00:42:52.284615 ignition[786]: INFO : Stage: mount May 17 00:42:52.285500 ignition[786]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:52.286563 ignition[786]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:52.291608 coreos-metadata[733]: May 17 00:42:52.289 INFO Fetch successful May 17 00:42:52.292896 coreos-metadata[734]: May 17 00:42:52.291 INFO Fetch successful May 17 00:42:52.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:52.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:52.293846 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. May 17 00:42:52.294056 systemd[1]: Finished flatcar-digitalocean-network.service. May 17 00:42:52.297317 ignition[786]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:52.297317 ignition[786]: INFO : mount: mount passed May 17 00:42:52.297317 ignition[786]: INFO : Ignition finished successfully May 17 00:42:52.297547 systemd[1]: Finished ignition-mount.service. May 17 00:42:52.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:52.299757 coreos-metadata[734]: May 17 00:42:52.299 INFO wrote hostname ci-3510.3.7-n-82bffd3759 to /sysroot/etc/hostname May 17 00:42:52.302240 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 00:42:52.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:52.508424 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:42:52.519705 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (793) May 17 00:42:52.530795 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:42:52.530890 kernel: BTRFS info (device vda6): using free space tree May 17 00:42:52.530920 kernel: BTRFS info (device vda6): has skinny extents May 17 00:42:52.535722 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:42:52.537489 systemd[1]: Starting ignition-files.service... May 17 00:42:52.564216 ignition[813]: INFO : Ignition 2.14.0 May 17 00:42:52.565361 ignition[813]: INFO : Stage: files May 17 00:42:52.566158 ignition[813]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:52.566869 ignition[813]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:52.571059 ignition[813]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:52.573235 ignition[813]: DEBUG : files: compiled without relabeling support, skipping May 17 00:42:52.574149 ignition[813]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:42:52.574702 ignition[813]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:42:52.578129 ignition[813]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:42:52.578810 ignition[813]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:42:52.579373 ignition[813]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:42:52.579344 unknown[813]: wrote ssh authorized keys file for user: core May 17 00:42:52.582604 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 17 00:42:52.583472 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:42:52.583472 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:42:52.583472 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:42:52.583472 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:42:52.583472 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:42:52.587202 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:42:52.587202 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 May 17 00:42:53.160133 systemd-networkd[690]: eth0: Gained IPv6LL May 17 00:42:53.457415 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 17 00:42:53.543953 systemd-networkd[690]: eth1: Gained IPv6LL May 17 00:42:53.765309 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:42:53.765309 ignition[813]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" May 17 00:42:53.765309 ignition[813]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" May 17 00:42:53.765309 ignition[813]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:42:53.768175 ignition[813]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:42:53.772963 ignition[813]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:42:53.773928 ignition[813]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:42:53.774713 ignition[813]: INFO : files: files passed May 17 00:42:53.775324 ignition[813]: INFO : Ignition finished successfully May 17 00:42:53.778515 systemd[1]: Finished ignition-files.service. May 17 00:42:53.784187 kernel: kauditd_printk_skb: 28 callbacks suppressed May 17 00:42:53.784223 kernel: audit: type=1130 audit(1747442573.778:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.780312 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:42:53.785012 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:42:53.786381 systemd[1]: Starting ignition-quench.service... May 17 00:42:53.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.790973 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:42:53.797146 kernel: audit: type=1130 audit(1747442573.790:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.797181 kernel: audit: type=1131 audit(1747442573.790:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.797245 initrd-setup-root-after-ignition[838]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:42:53.791103 systemd[1]: Finished ignition-quench.service. May 17 00:42:53.798764 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:42:53.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.799744 systemd[1]: Reached target ignition-complete.target. May 17 00:42:53.802705 kernel: audit: type=1130 audit(1747442573.798:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.803777 systemd[1]: Starting initrd-parse-etc.service... May 17 00:42:53.821491 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:42:53.821619 systemd[1]: Finished initrd-parse-etc.service. May 17 00:42:53.827888 kernel: audit: type=1130 audit(1747442573.821:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.827923 kernel: audit: type=1131 audit(1747442573.821:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.822625 systemd[1]: Reached target initrd-fs.target. May 17 00:42:53.828124 systemd[1]: Reached target initrd.target. May 17 00:42:53.828837 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:42:53.829894 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:42:53.844132 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:42:53.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.847724 kernel: audit: type=1130 audit(1747442573.844:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.846281 systemd[1]: Starting initrd-cleanup.service... May 17 00:42:53.857894 systemd[1]: Stopped target nss-lookup.target. May 17 00:42:53.858893 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:42:53.859834 systemd[1]: Stopped target timers.target. May 17 00:42:53.860621 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:42:53.861222 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:42:53.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.865493 systemd[1]: Stopped target initrd.target. May 17 00:42:53.866127 kernel: audit: type=1131 audit(1747442573.861:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.866777 systemd[1]: Stopped target basic.target. May 17 00:42:53.867545 systemd[1]: Stopped target ignition-complete.target. May 17 00:42:53.868399 systemd[1]: Stopped target ignition-diskful.target. May 17 00:42:53.869158 systemd[1]: Stopped target initrd-root-device.target. May 17 00:42:53.869927 systemd[1]: Stopped target remote-fs.target. May 17 00:42:53.870866 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:42:53.871747 systemd[1]: Stopped target sysinit.target. May 17 00:42:53.872617 systemd[1]: Stopped target local-fs.target. May 17 00:42:53.873448 systemd[1]: Stopped target local-fs-pre.target. May 17 00:42:53.874271 systemd[1]: Stopped target swap.target. May 17 00:42:53.875086 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:42:53.875656 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:42:53.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.878666 kernel: audit: type=1131 audit(1747442573.875:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.878694 systemd[1]: Stopped target cryptsetup.target. May 17 00:42:53.879201 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:42:53.882817 kernel: audit: type=1131 audit(1747442573.879:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.879333 systemd[1]: Stopped dracut-initqueue.service. May 17 00:42:53.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.879929 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:42:53.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.880051 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:42:53.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.883237 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:42:53.883346 systemd[1]: Stopped ignition-files.service. May 17 00:42:53.883796 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 00:42:53.883892 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 00:42:53.885583 systemd[1]: Stopping ignition-mount.service... May 17 00:42:53.899367 ignition[851]: INFO : Ignition 2.14.0 May 17 00:42:53.899367 ignition[851]: INFO : Stage: umount May 17 00:42:53.899367 ignition[851]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:42:53.899367 ignition[851]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 17 00:42:53.899367 ignition[851]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 17 00:42:53.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.904237 iscsid[695]: iscsid shutting down. May 17 00:42:53.893545 systemd[1]: Stopping iscsid.service... May 17 00:42:53.905166 ignition[851]: INFO : umount: umount passed May 17 00:42:53.905166 ignition[851]: INFO : Ignition finished successfully May 17 00:42:53.898982 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:42:53.899169 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:42:53.900719 systemd[1]: Stopping sysroot-boot.service... May 17 00:42:53.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.907592 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:42:53.907812 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:42:53.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.908282 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:42:53.908380 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:42:53.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.910991 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:42:53.911095 systemd[1]: Stopped iscsid.service. May 17 00:42:53.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.913163 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:42:53.913252 systemd[1]: Stopped ignition-mount.service. May 17 00:42:53.916734 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:42:53.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.916819 systemd[1]: Finished initrd-cleanup.service. May 17 00:42:53.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.918914 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:42:53.918976 systemd[1]: Stopped ignition-disks.service. May 17 00:42:53.920366 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:42:53.920419 systemd[1]: Stopped ignition-kargs.service. May 17 00:42:53.921271 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:42:53.921318 systemd[1]: Stopped ignition-fetch.service. May 17 00:42:53.921626 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:42:53.921677 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:42:53.922052 systemd[1]: Stopped target paths.target. May 17 00:42:53.922314 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:42:53.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.923827 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:42:53.924798 systemd[1]: Stopped target slices.target. May 17 00:42:53.926108 systemd[1]: Stopped target sockets.target. May 17 00:42:53.926805 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:42:53.926862 systemd[1]: Closed iscsid.socket. May 17 00:42:53.927405 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:42:53.927456 systemd[1]: Stopped ignition-setup.service. May 17 00:42:53.930807 systemd[1]: Stopping iscsiuio.service... May 17 00:42:53.932323 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:42:53.932822 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:42:53.932935 systemd[1]: Stopped iscsiuio.service. May 17 00:42:53.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.933813 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:42:53.933938 systemd[1]: Stopped sysroot-boot.service. May 17 00:42:53.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.934837 systemd[1]: Stopped target network.target. May 17 00:42:53.935223 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:42:53.935270 systemd[1]: Closed iscsiuio.socket. May 17 00:42:53.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.935893 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:42:53.935943 systemd[1]: Stopped initrd-setup-root.service. May 17 00:42:53.936967 systemd[1]: Stopping systemd-networkd.service... May 17 00:42:53.937639 systemd[1]: Stopping systemd-resolved.service... May 17 00:42:53.940746 systemd-networkd[690]: eth1: DHCPv6 lease lost May 17 00:42:53.943341 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:42:53.943469 systemd[1]: Stopped systemd-resolved.service. May 17 00:42:53.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.945736 systemd-networkd[690]: eth0: DHCPv6 lease lost May 17 00:42:53.946000 audit: BPF prog-id=6 op=UNLOAD May 17 00:42:53.947160 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:42:53.947317 systemd[1]: Stopped systemd-networkd.service. May 17 00:42:53.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.948545 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:42:53.948589 systemd[1]: Closed systemd-networkd.socket. May 17 00:42:53.949000 audit: BPF prog-id=9 op=UNLOAD May 17 00:42:53.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.950364 systemd[1]: Stopping network-cleanup.service... May 17 00:42:53.950739 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:42:53.950810 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:42:53.951189 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:42:53.951227 systemd[1]: Stopped systemd-sysctl.service. May 17 00:42:53.951622 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:42:53.951705 systemd[1]: Stopped systemd-modules-load.service. May 17 00:42:53.957742 systemd[1]: Stopping systemd-udevd.service... May 17 00:42:53.959722 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:42:53.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.962938 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:42:53.963135 systemd[1]: Stopped systemd-udevd.service. May 17 00:42:53.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.963892 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:42:53.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.963932 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:42:53.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.964315 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:42:53.964354 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:42:53.964859 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:42:53.964904 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:42:53.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.965671 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:42:53.965717 systemd[1]: Stopped dracut-cmdline.service. May 17 00:42:53.966320 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:42:53.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.966357 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:42:53.968403 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:42:53.969142 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:42:53.969233 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:42:53.970778 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:42:53.970961 systemd[1]: Stopped network-cleanup.service. May 17 00:42:53.980350 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:42:53.980451 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:42:53.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:53.981482 systemd[1]: Reached target initrd-switch-root.target. May 17 00:42:53.983149 systemd[1]: Starting initrd-switch-root.service... May 17 00:42:53.996564 systemd[1]: Switching root. May 17 00:42:54.016001 systemd-journald[185]: Journal stopped May 17 00:42:58.087292 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 17 00:42:58.087399 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:42:58.087426 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:42:58.087448 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:42:58.087471 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:42:58.087496 kernel: SELinux: policy capability open_perms=1 May 17 00:42:58.087514 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:42:58.087532 kernel: SELinux: policy capability always_check_network=0 May 17 00:42:58.087550 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:42:58.087572 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:42:58.087593 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:42:58.087611 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:42:58.087639 systemd[1]: Successfully loaded SELinux policy in 46.259ms. May 17 00:42:58.087694 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.293ms. May 17 00:42:58.087718 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:42:58.087738 systemd[1]: Detected virtualization kvm. May 17 00:42:58.087759 systemd[1]: Detected architecture x86-64. May 17 00:42:58.087779 systemd[1]: Detected first boot. May 17 00:42:58.087809 systemd[1]: Hostname set to . May 17 00:42:58.087830 systemd[1]: Initializing machine ID from VM UUID. May 17 00:42:58.087851 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:42:58.087871 systemd[1]: Populated /etc with preset unit settings. May 17 00:42:58.087893 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:42:58.087925 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:42:58.087948 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:42:58.087987 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:42:58.088008 systemd[1]: Stopped initrd-switch-root.service. May 17 00:42:58.088028 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:42:58.088049 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:42:58.088070 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:42:58.088100 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 17 00:42:58.088120 systemd[1]: Created slice system-getty.slice. May 17 00:42:58.088140 systemd[1]: Created slice system-modprobe.slice. May 17 00:42:58.088161 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:42:58.088181 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:42:58.088202 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:42:58.088221 systemd[1]: Created slice user.slice. May 17 00:42:58.088241 systemd[1]: Started systemd-ask-password-console.path. May 17 00:42:58.088262 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:42:58.088286 systemd[1]: Set up automount boot.automount. May 17 00:42:58.088307 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:42:58.088327 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:42:58.088348 systemd[1]: Stopped target initrd-fs.target. May 17 00:42:58.088375 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:42:58.088396 systemd[1]: Reached target integritysetup.target. May 17 00:42:58.088420 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:42:58.088447 systemd[1]: Reached target remote-fs.target. May 17 00:42:58.088467 systemd[1]: Reached target slices.target. May 17 00:42:58.088487 systemd[1]: Reached target swap.target. May 17 00:42:58.088508 systemd[1]: Reached target torcx.target. May 17 00:42:58.088528 systemd[1]: Reached target veritysetup.target. May 17 00:42:58.088550 systemd[1]: Listening on systemd-coredump.socket. May 17 00:42:58.088570 systemd[1]: Listening on systemd-initctl.socket. May 17 00:42:58.088591 systemd[1]: Listening on systemd-networkd.socket. May 17 00:42:58.088612 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:42:58.088634 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:42:58.088666 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:42:58.088683 systemd[1]: Mounting dev-hugepages.mount... May 17 00:42:58.088702 systemd[1]: Mounting dev-mqueue.mount... May 17 00:42:58.088723 systemd[1]: Mounting media.mount... May 17 00:42:58.088743 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:58.088764 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:42:58.088783 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:42:58.088804 systemd[1]: Mounting tmp.mount... May 17 00:42:58.088828 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:42:58.088848 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:42:58.088869 systemd[1]: Starting kmod-static-nodes.service... May 17 00:42:58.088897 systemd[1]: Starting modprobe@configfs.service... May 17 00:42:58.088917 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:42:58.088938 systemd[1]: Starting modprobe@drm.service... May 17 00:42:58.088960 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:42:58.088980 systemd[1]: Starting modprobe@fuse.service... May 17 00:42:58.089001 systemd[1]: Starting modprobe@loop.service... May 17 00:42:58.089025 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:42:58.089046 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:42:58.089067 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:42:58.089087 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:42:58.089107 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:42:58.089127 systemd[1]: Stopped systemd-journald.service. May 17 00:42:58.089147 systemd[1]: Starting systemd-journald.service... May 17 00:42:58.089167 systemd[1]: Starting systemd-modules-load.service... May 17 00:42:58.089188 systemd[1]: Starting systemd-network-generator.service... May 17 00:42:58.089213 systemd[1]: Starting systemd-remount-fs.service... May 17 00:42:58.089234 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:42:58.089254 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:42:58.089274 systemd[1]: Stopped verity-setup.service. May 17 00:42:58.089296 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:58.089316 systemd[1]: Mounted dev-hugepages.mount. May 17 00:42:58.089345 systemd[1]: Mounted dev-mqueue.mount. May 17 00:42:58.089365 systemd[1]: Mounted media.mount. May 17 00:42:58.089386 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:42:58.089410 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:42:58.089430 systemd[1]: Mounted tmp.mount. May 17 00:42:58.089450 kernel: loop: module loaded May 17 00:42:58.089470 systemd[1]: Finished kmod-static-nodes.service. May 17 00:42:58.089491 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:42:58.089512 systemd[1]: Finished modprobe@configfs.service. May 17 00:42:58.089532 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:42:58.089553 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:42:58.089574 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:42:58.089598 systemd[1]: Finished modprobe@drm.service. May 17 00:42:58.089619 kernel: fuse: init (API version 7.34) May 17 00:42:58.089638 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:42:58.089671 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:42:58.089689 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:42:58.089713 systemd[1]: Finished modprobe@fuse.service. May 17 00:42:58.089733 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:42:58.089752 systemd[1]: Finished modprobe@loop.service. May 17 00:42:58.089774 systemd[1]: Finished systemd-modules-load.service. May 17 00:42:58.089802 systemd[1]: Finished systemd-network-generator.service. May 17 00:42:58.089821 systemd[1]: Finished systemd-remount-fs.service. May 17 00:42:58.089839 systemd[1]: Reached target network-pre.target. May 17 00:42:58.089860 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:42:58.089881 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:42:58.089907 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:42:58.090080 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:42:58.090114 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:42:58.090136 systemd[1]: Starting systemd-random-seed.service... May 17 00:42:58.090166 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:42:58.090191 systemd[1]: Starting systemd-sysctl.service... May 17 00:42:58.090221 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:42:58.090244 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:42:58.090267 systemd[1]: Finished systemd-random-seed.service. May 17 00:42:58.090286 systemd[1]: Reached target first-boot-complete.target. May 17 00:42:58.090312 systemd-journald[953]: Journal started May 17 00:42:58.090406 systemd-journald[953]: Runtime Journal (/run/log/journal/c0cce03ea2fc4f128bc61cc717d30a96) is 4.9M, max 39.5M, 34.5M free. May 17 00:42:54.152000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:42:58.098207 systemd[1]: Started systemd-journald.service. May 17 00:42:54.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:42:54.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:42:54.233000 audit: BPF prog-id=10 op=LOAD May 17 00:42:54.233000 audit: BPF prog-id=10 op=UNLOAD May 17 00:42:54.233000 audit: BPF prog-id=11 op=LOAD May 17 00:42:54.233000 audit: BPF prog-id=11 op=UNLOAD May 17 00:42:54.370000 audit[883]: AVC avc: denied { associate } for pid=883 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:42:54.370000 audit[883]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=866 pid=883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:54.370000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:42:54.373000 audit[883]: AVC avc: denied { associate } for pid=883 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:42:54.373000 audit[883]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d969 a2=1ed a3=0 items=2 ppid=866 pid=883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:54.373000 audit: CWD cwd="/" May 17 00:42:54.373000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:54.373000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:54.373000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:42:57.765000 audit: BPF prog-id=12 op=LOAD May 17 00:42:57.765000 audit: BPF prog-id=3 op=UNLOAD May 17 00:42:57.765000 audit: BPF prog-id=13 op=LOAD May 17 00:42:57.765000 audit: BPF prog-id=14 op=LOAD May 17 00:42:57.765000 audit: BPF prog-id=4 op=UNLOAD May 17 00:42:57.765000 audit: BPF prog-id=5 op=UNLOAD May 17 00:42:57.766000 audit: BPF prog-id=15 op=LOAD May 17 00:42:57.766000 audit: BPF prog-id=12 op=UNLOAD May 17 00:42:57.766000 audit: BPF prog-id=16 op=LOAD May 17 00:42:57.766000 audit: BPF prog-id=17 op=LOAD May 17 00:42:57.766000 audit: BPF prog-id=13 op=UNLOAD May 17 00:42:57.766000 audit: BPF prog-id=14 op=UNLOAD May 17 00:42:57.767000 audit: BPF prog-id=18 op=LOAD May 17 00:42:57.767000 audit: BPF prog-id=15 op=UNLOAD May 17 00:42:57.767000 audit: BPF prog-id=19 op=LOAD May 17 00:42:57.768000 audit: BPF prog-id=20 op=LOAD May 17 00:42:57.768000 audit: BPF prog-id=16 op=UNLOAD May 17 00:42:57.768000 audit: BPF prog-id=17 op=UNLOAD May 17 00:42:57.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.775000 audit: BPF prog-id=18 op=UNLOAD May 17 00:42:57.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.901000 audit: BPF prog-id=21 op=LOAD May 17 00:42:57.901000 audit: BPF prog-id=22 op=LOAD May 17 00:42:57.901000 audit: BPF prog-id=23 op=LOAD May 17 00:42:57.901000 audit: BPF prog-id=19 op=UNLOAD May 17 00:42:57.901000 audit: BPF prog-id=20 op=UNLOAD May 17 00:42:57.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.084000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:42:58.084000 audit[953]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffc91848390 a2=4000 a3=7ffc9184842c items=0 ppid=1 pid=953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:58.084000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:42:58.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.763974 systemd[1]: Queued start job for default target multi-user.target. May 17 00:42:58.105397 systemd-journald[953]: Time spent on flushing to /var/log/journal/c0cce03ea2fc4f128bc61cc717d30a96 is 59.288ms for 1114 entries. May 17 00:42:58.105397 systemd-journald[953]: System Journal (/var/log/journal/c0cce03ea2fc4f128bc61cc717d30a96) is 8.0M, max 195.6M, 187.6M free. May 17 00:42:58.182375 systemd-journald[953]: Received client request to flush runtime journal. May 17 00:42:58.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:54.366543 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:42:58.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:57.763989 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 17 00:42:54.367205 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:42:57.769097 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:42:54.367245 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:42:58.094555 systemd[1]: Starting systemd-journal-flush.service... May 17 00:42:54.367301 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:42:58.117901 systemd[1]: Finished systemd-sysctl.service. May 17 00:42:54.367320 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:42:58.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.142625 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:42:54.367431 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:42:58.145141 systemd[1]: Starting systemd-sysusers.service... May 17 00:42:54.367456 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:42:58.174436 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:42:54.367885 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:42:58.177037 systemd[1]: Starting systemd-udev-settle.service... May 17 00:42:54.367971 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:42:58.184424 systemd[1]: Finished systemd-journal-flush.service. May 17 00:42:54.368001 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:42:58.198415 systemd[1]: Finished systemd-sysusers.service. May 17 00:42:54.370293 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:42:54.370365 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:42:54.370407 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:42:54.370435 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:42:54.370510 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:42:54.370535 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:42:57.293518 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:57Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:42:57.297799 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:57Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:42:57.298210 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:57Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:42:57.298895 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:57Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:42:57.299004 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:57Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:42:57.299134 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-05-17T00:42:57Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:42:58.204995 udevadm[992]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 17 00:42:58.802579 kernel: kauditd_printk_skb: 107 callbacks suppressed May 17 00:42:58.802708 kernel: audit: type=1130 audit(1747442578.795:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.802757 kernel: audit: type=1334 audit(1747442578.799:148): prog-id=24 op=LOAD May 17 00:42:58.802776 kernel: audit: type=1334 audit(1747442578.801:149): prog-id=25 op=LOAD May 17 00:42:58.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.799000 audit: BPF prog-id=24 op=LOAD May 17 00:42:58.801000 audit: BPF prog-id=25 op=LOAD May 17 00:42:58.795663 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:42:58.803195 systemd[1]: Starting systemd-udevd.service... May 17 00:42:58.804903 kernel: audit: type=1334 audit(1747442578.801:150): prog-id=7 op=UNLOAD May 17 00:42:58.801000 audit: BPF prog-id=7 op=UNLOAD May 17 00:42:58.806311 kernel: audit: type=1334 audit(1747442578.801:151): prog-id=8 op=UNLOAD May 17 00:42:58.801000 audit: BPF prog-id=8 op=UNLOAD May 17 00:42:58.834636 systemd-udevd[994]: Using default interface naming scheme 'v252'. May 17 00:42:58.870980 systemd[1]: Started systemd-udevd.service. May 17 00:42:58.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.871000 audit: BPF prog-id=26 op=LOAD May 17 00:42:58.878465 kernel: audit: type=1130 audit(1747442578.870:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.878571 kernel: audit: type=1334 audit(1747442578.871:153): prog-id=26 op=LOAD May 17 00:42:58.878778 systemd[1]: Starting systemd-networkd.service... May 17 00:42:58.888000 audit: BPF prog-id=27 op=LOAD May 17 00:42:58.888000 audit: BPF prog-id=28 op=LOAD May 17 00:42:58.888000 audit: BPF prog-id=29 op=LOAD May 17 00:42:58.892496 kernel: audit: type=1334 audit(1747442578.888:154): prog-id=27 op=LOAD May 17 00:42:58.892578 kernel: audit: type=1334 audit(1747442578.888:155): prog-id=28 op=LOAD May 17 00:42:58.892610 kernel: audit: type=1334 audit(1747442578.888:156): prog-id=29 op=LOAD May 17 00:42:58.892755 systemd[1]: Starting systemd-userdbd.service... May 17 00:42:58.950768 systemd[1]: Started systemd-userdbd.service. May 17 00:42:58.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.955122 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:58.955328 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:42:58.956688 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:42:58.958328 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:42:58.960500 systemd[1]: Starting modprobe@loop.service... May 17 00:42:58.962938 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:42:58.963009 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:42:58.963117 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:58.963708 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:42:58.963900 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:42:58.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.964671 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:42:58.964802 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:42:58.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.965398 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:42:58.965525 systemd[1]: Finished modprobe@loop.service. May 17 00:42:58.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:58.966038 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:42:58.966090 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:42:58.993664 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:42:59.030038 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:42:59.071688 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:42:59.083735 systemd-networkd[998]: lo: Link UP May 17 00:42:59.084131 systemd-networkd[998]: lo: Gained carrier May 17 00:42:59.084938 systemd-networkd[998]: Enumeration completed May 17 00:42:59.085241 systemd-networkd[998]: eth1: Configuring with /run/systemd/network/10-b2:c1:f5:fd:c5:93.network. May 17 00:42:59.085876 systemd[1]: Started systemd-networkd.service. May 17 00:42:59.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.086717 kernel: ACPI: button: Power Button [PWRF] May 17 00:42:59.087887 systemd-networkd[998]: eth0: Configuring with /run/systemd/network/10-da:8c:c1:1a:e8:a7.network. May 17 00:42:59.089008 systemd-networkd[998]: eth1: Link UP May 17 00:42:59.089174 systemd-networkd[998]: eth1: Gained carrier May 17 00:42:59.094118 systemd-networkd[998]: eth0: Link UP May 17 00:42:59.094132 systemd-networkd[998]: eth0: Gained carrier May 17 00:42:59.127000 audit[997]: AVC avc: denied { confidentiality } for pid=997 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:42:59.127000 audit[997]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560d39ebcf70 a1=338ac a2=7fa010fa4bc5 a3=5 items=110 ppid=994 pid=997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:59.127000 audit: CWD cwd="/" May 17 00:42:59.127000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=1 name=(null) inode=13184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=2 name=(null) inode=13184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=3 name=(null) inode=13185 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=4 name=(null) inode=13184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=5 name=(null) inode=13186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=6 name=(null) inode=13184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=7 name=(null) inode=13187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=8 name=(null) inode=13187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=9 name=(null) inode=13188 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=10 name=(null) inode=13187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=11 name=(null) inode=13189 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=12 name=(null) inode=13187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=13 name=(null) inode=13190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=14 name=(null) inode=13187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=15 name=(null) inode=13191 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=16 name=(null) inode=13187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=17 name=(null) inode=13192 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=18 name=(null) inode=13184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=19 name=(null) inode=13193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=20 name=(null) inode=13193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=21 name=(null) inode=13194 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=22 name=(null) inode=13193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=23 name=(null) inode=13195 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=24 name=(null) inode=13193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=25 name=(null) inode=13196 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=26 name=(null) inode=13193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=27 name=(null) inode=13197 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=28 name=(null) inode=13193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=29 name=(null) inode=13198 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=30 name=(null) inode=13184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=31 name=(null) inode=13199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=32 name=(null) inode=13199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=33 name=(null) inode=13200 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=34 name=(null) inode=13199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=35 name=(null) inode=13201 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=36 name=(null) inode=13199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=37 name=(null) inode=13202 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=38 name=(null) inode=13199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=39 name=(null) inode=13203 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=40 name=(null) inode=13199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=41 name=(null) inode=13204 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=42 name=(null) inode=13184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=43 name=(null) inode=13205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=44 name=(null) inode=13205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=45 name=(null) inode=13206 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=46 name=(null) inode=13205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=47 name=(null) inode=13207 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=48 name=(null) inode=13205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=49 name=(null) inode=13208 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=50 name=(null) inode=13205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=51 name=(null) inode=13209 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=52 name=(null) inode=13205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=53 name=(null) inode=13210 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=55 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=56 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=57 name=(null) inode=13212 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=58 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=59 name=(null) inode=13213 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=60 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=61 name=(null) inode=13214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=62 name=(null) inode=13214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=63 name=(null) inode=13215 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=64 name=(null) inode=13214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=65 name=(null) inode=13216 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=66 name=(null) inode=13214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=67 name=(null) inode=13217 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=68 name=(null) inode=13214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=69 name=(null) inode=13218 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=70 name=(null) inode=13214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=71 name=(null) inode=13219 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=72 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=73 name=(null) inode=13220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=74 name=(null) inode=13220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=75 name=(null) inode=13221 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=76 name=(null) inode=13220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=77 name=(null) inode=13222 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=78 name=(null) inode=13220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=79 name=(null) inode=13223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=80 name=(null) inode=13220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=81 name=(null) inode=13224 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=82 name=(null) inode=13220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=83 name=(null) inode=13225 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=84 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=85 name=(null) inode=13226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=86 name=(null) inode=13226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=87 name=(null) inode=13227 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=88 name=(null) inode=13226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=89 name=(null) inode=13228 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=90 name=(null) inode=13226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=91 name=(null) inode=13229 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=92 name=(null) inode=13226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=93 name=(null) inode=13230 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=94 name=(null) inode=13226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=95 name=(null) inode=13231 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=96 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=97 name=(null) inode=13232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=98 name=(null) inode=13232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=99 name=(null) inode=13233 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=100 name=(null) inode=13232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=101 name=(null) inode=13234 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=102 name=(null) inode=13232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=103 name=(null) inode=13235 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=104 name=(null) inode=13232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=105 name=(null) inode=13236 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=106 name=(null) inode=13232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=107 name=(null) inode=13237 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PATH item=109 name=(null) inode=13238 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:59.127000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:42:59.153687 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 17 00:42:59.173691 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 17 00:42:59.195689 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:42:59.316741 kernel: EDAC MC: Ver: 3.0.0 May 17 00:42:59.338389 systemd[1]: Finished systemd-udev-settle.service. May 17 00:42:59.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.340906 systemd[1]: Starting lvm2-activation-early.service... May 17 00:42:59.364411 lvm[1032]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:42:59.395585 systemd[1]: Finished lvm2-activation-early.service. May 17 00:42:59.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.396245 systemd[1]: Reached target cryptsetup.target. May 17 00:42:59.398773 systemd[1]: Starting lvm2-activation.service... May 17 00:42:59.405948 lvm[1033]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:42:59.436162 systemd[1]: Finished lvm2-activation.service. May 17 00:42:59.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.436980 systemd[1]: Reached target local-fs-pre.target. May 17 00:42:59.440178 systemd[1]: Mounting media-configdrive.mount... May 17 00:42:59.441005 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:42:59.441078 systemd[1]: Reached target machines.target. May 17 00:42:59.443546 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:42:59.462692 kernel: ISO 9660 Extensions: RRIP_1991A May 17 00:42:59.465298 systemd[1]: Mounted media-configdrive.mount. May 17 00:42:59.466303 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:42:59.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.467204 systemd[1]: Reached target local-fs.target. May 17 00:42:59.470041 systemd[1]: Starting ldconfig.service... May 17 00:42:59.471514 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:42:59.471598 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:42:59.475145 systemd[1]: Starting systemd-boot-update.service... May 17 00:42:59.481714 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:42:59.485847 systemd[1]: Starting systemd-sysext.service... May 17 00:42:59.487074 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1039 (bootctl) May 17 00:42:59.489553 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:42:59.516288 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:42:59.527789 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:42:59.528037 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:42:59.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.533285 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:42:59.534220 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:42:59.553702 kernel: loop0: detected capacity change from 0 to 229808 May 17 00:42:59.580815 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:42:59.608712 kernel: loop1: detected capacity change from 0 to 229808 May 17 00:42:59.628949 (sd-sysext)[1049]: Using extensions 'kubernetes'. May 17 00:42:59.631341 (sd-sysext)[1049]: Merged extensions into '/usr'. May 17 00:42:59.643085 systemd-fsck[1046]: fsck.fat 4.2 (2021-01-31) May 17 00:42:59.643085 systemd-fsck[1046]: /dev/vda1: 790 files, 120726/258078 clusters May 17 00:42:59.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.650951 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:42:59.653622 systemd[1]: Mounting boot.mount... May 17 00:42:59.673759 systemd[1]: Mounted boot.mount. May 17 00:42:59.675018 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:59.677590 systemd[1]: Mounting usr-share-oem.mount... May 17 00:42:59.682337 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:42:59.685530 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:42:59.689727 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:42:59.692483 systemd[1]: Starting modprobe@loop.service... May 17 00:42:59.695093 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:42:59.695404 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:42:59.695615 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:42:59.697510 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:42:59.697784 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:42:59.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.699596 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:42:59.699838 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:42:59.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.702275 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:42:59.702787 systemd[1]: Finished modprobe@loop.service. May 17 00:42:59.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.709968 systemd[1]: Mounted usr-share-oem.mount. May 17 00:42:59.711595 systemd[1]: Finished systemd-sysext.service. May 17 00:42:59.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.715660 systemd[1]: Finished systemd-boot-update.service. May 17 00:42:59.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:42:59.720011 systemd[1]: Starting ensure-sysext.service... May 17 00:42:59.720573 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:42:59.720767 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:42:59.722277 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:42:59.737075 systemd[1]: Reloading. May 17 00:42:59.768779 systemd-tmpfiles[1057]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:42:59.775216 systemd-tmpfiles[1057]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:42:59.783426 systemd-tmpfiles[1057]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:42:59.892256 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T00:42:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:42:59.892301 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2025-05-17T00:42:59Z" level=info msg="torcx already run" May 17 00:42:59.907418 ldconfig[1038]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:43:00.027538 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:43:00.027830 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:43:00.054683 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:43:00.138000 audit: BPF prog-id=30 op=LOAD May 17 00:43:00.139000 audit: BPF prog-id=21 op=UNLOAD May 17 00:43:00.139000 audit: BPF prog-id=31 op=LOAD May 17 00:43:00.139000 audit: BPF prog-id=32 op=LOAD May 17 00:43:00.139000 audit: BPF prog-id=22 op=UNLOAD May 17 00:43:00.139000 audit: BPF prog-id=23 op=UNLOAD May 17 00:43:00.142000 audit: BPF prog-id=33 op=LOAD May 17 00:43:00.143000 audit: BPF prog-id=34 op=LOAD May 17 00:43:00.143000 audit: BPF prog-id=24 op=UNLOAD May 17 00:43:00.143000 audit: BPF prog-id=25 op=UNLOAD May 17 00:43:00.145000 audit: BPF prog-id=35 op=LOAD May 17 00:43:00.146000 audit: BPF prog-id=27 op=UNLOAD May 17 00:43:00.146000 audit: BPF prog-id=36 op=LOAD May 17 00:43:00.146000 audit: BPF prog-id=37 op=LOAD May 17 00:43:00.146000 audit: BPF prog-id=28 op=UNLOAD May 17 00:43:00.146000 audit: BPF prog-id=29 op=UNLOAD May 17 00:43:00.147000 audit: BPF prog-id=38 op=LOAD May 17 00:43:00.147000 audit: BPF prog-id=26 op=UNLOAD May 17 00:43:00.153084 systemd[1]: Finished ldconfig.service. May 17 00:43:00.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.155087 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:43:00.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.159364 systemd[1]: Starting audit-rules.service... May 17 00:43:00.161666 systemd[1]: Starting clean-ca-certificates.service... May 17 00:43:00.164049 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:43:00.165000 audit: BPF prog-id=39 op=LOAD May 17 00:43:00.168191 systemd[1]: Starting systemd-resolved.service... May 17 00:43:00.171000 audit: BPF prog-id=40 op=LOAD May 17 00:43:00.175235 systemd[1]: Starting systemd-timesyncd.service... May 17 00:43:00.177892 systemd[1]: Starting systemd-update-utmp.service... May 17 00:43:00.193213 systemd[1]: Finished clean-ca-certificates.service. May 17 00:43:00.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.193961 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:43:00.202909 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:43:00.204787 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:43:00.208533 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:43:00.211792 systemd[1]: Starting modprobe@loop.service... May 17 00:43:00.212255 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:43:00.212400 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:43:00.212529 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:43:00.213471 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:43:00.213639 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:43:00.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.216248 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:43:00.216387 systemd[1]: Finished modprobe@loop.service. May 17 00:43:00.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.217127 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:43:00.218987 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:43:00.222720 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:43:00.225307 systemd[1]: Starting modprobe@loop.service... May 17 00:43:00.225973 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:43:00.226191 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:43:00.226354 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:43:00.227873 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:43:00.228053 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:43:00.228000 audit[1130]: SYSTEM_BOOT pid=1130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:43:00.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.237193 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:43:00.242341 systemd[1]: Starting modprobe@drm.service... May 17 00:43:00.245255 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:43:00.246051 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:43:00.246337 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:43:00.249259 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:43:00.250301 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:43:00.257328 systemd[1]: Finished ensure-sysext.service. May 17 00:43:00.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.258729 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:43:00.258926 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:43:00.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.264910 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:43:00.265743 systemd[1]: Finished systemd-update-utmp.service. May 17 00:43:00.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.274390 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:43:00.274583 systemd[1]: Finished modprobe@loop.service. May 17 00:43:00.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.275552 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:43:00.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.276311 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:43:00.276517 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:43:00.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.277149 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:43:00.279391 systemd[1]: Starting systemd-update-done.service... May 17 00:43:00.285193 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:43:00.285447 systemd[1]: Finished modprobe@drm.service. May 17 00:43:00.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.295507 systemd[1]: Finished systemd-update-done.service. May 17 00:43:00.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:00.320000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:43:00.320000 audit[1154]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd5f11cff0 a2=420 a3=0 items=0 ppid=1124 pid=1154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:00.320000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:43:00.321980 augenrules[1154]: No rules May 17 00:43:00.322266 systemd[1]: Finished audit-rules.service. May 17 00:43:00.327902 systemd-networkd[998]: eth1: Gained IPv6LL May 17 00:43:00.331920 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:43:00.339948 systemd[1]: Started systemd-timesyncd.service. May 17 00:43:00.340516 systemd[1]: Reached target time-set.target. May 17 00:43:00.348700 systemd-resolved[1127]: Positive Trust Anchors: May 17 00:43:00.348715 systemd-resolved[1127]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:43:00.348749 systemd-resolved[1127]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:43:00.354991 systemd-resolved[1127]: Using system hostname 'ci-3510.3.7-n-82bffd3759'. May 17 00:43:00.357307 systemd[1]: Started systemd-resolved.service. May 17 00:43:00.357969 systemd[1]: Reached target network.target. May 17 00:43:00.358288 systemd[1]: Reached target network-online.target. May 17 00:43:00.358577 systemd[1]: Reached target nss-lookup.target. May 17 00:43:00.358899 systemd[1]: Reached target sysinit.target. May 17 00:43:00.359278 systemd[1]: Started motdgen.path. May 17 00:43:00.359592 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:43:00.360146 systemd[1]: Started logrotate.timer. May 17 00:43:00.360521 systemd[1]: Started mdadm.timer. May 17 00:43:00.360814 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:43:00.361118 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:43:00.361151 systemd[1]: Reached target paths.target. May 17 00:43:00.361416 systemd[1]: Reached target timers.target. May 17 00:43:00.362143 systemd[1]: Listening on dbus.socket. May 17 00:43:00.363400 systemd-timesyncd[1129]: Contacted time server 65.182.224.39:123 (0.flatcar.pool.ntp.org). May 17 00:43:00.364016 systemd[1]: Starting docker.socket... May 17 00:43:00.365218 systemd-timesyncd[1129]: Initial clock synchronization to Sat 2025-05-17 00:43:00.114221 UTC. May 17 00:43:00.368849 systemd[1]: Listening on sshd.socket. May 17 00:43:00.369554 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:43:00.370516 systemd[1]: Listening on docker.socket. May 17 00:43:00.370962 systemd[1]: Reached target sockets.target. May 17 00:43:00.371271 systemd[1]: Reached target basic.target. May 17 00:43:00.371634 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:43:00.371680 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:43:00.373270 systemd[1]: Starting containerd.service... May 17 00:43:00.375115 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 17 00:43:00.377821 systemd[1]: Starting dbus.service... May 17 00:43:00.381565 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:43:00.384968 systemd[1]: Starting extend-filesystems.service... May 17 00:43:00.385553 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:43:00.388845 systemd[1]: Starting kubelet.service... May 17 00:43:00.460849 jq[1167]: false May 17 00:43:00.392131 systemd[1]: Starting motdgen.service... May 17 00:43:00.396981 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:43:00.400949 systemd[1]: Starting sshd-keygen.service... May 17 00:43:00.406741 systemd[1]: Starting systemd-logind.service... May 17 00:43:00.421015 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:43:00.421186 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:43:00.422986 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:43:00.425704 systemd[1]: Starting update-engine.service... May 17 00:43:00.475634 jq[1184]: true May 17 00:43:00.431338 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:43:00.436549 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:43:00.438932 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:43:00.459968 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:43:00.460165 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:43:00.482433 dbus-daemon[1164]: [system] SELinux support is enabled May 17 00:43:00.467936 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:43:00.468000 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:43:00.482723 systemd[1]: Started dbus.service. May 17 00:43:00.485699 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:43:00.485731 systemd[1]: Reached target system-config.target. May 17 00:43:00.486265 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:43:00.486284 systemd[1]: Reached target user-config.target. May 17 00:43:00.505721 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:43:00.506028 systemd[1]: Finished motdgen.service. May 17 00:43:00.508035 jq[1189]: true May 17 00:43:00.513205 extend-filesystems[1168]: Found loop1 May 17 00:43:00.517177 extend-filesystems[1168]: Found vda May 17 00:43:00.518003 extend-filesystems[1168]: Found vda1 May 17 00:43:00.518567 extend-filesystems[1168]: Found vda2 May 17 00:43:00.520181 extend-filesystems[1168]: Found vda3 May 17 00:43:00.520742 extend-filesystems[1168]: Found usr May 17 00:43:00.521243 extend-filesystems[1168]: Found vda4 May 17 00:43:00.521781 extend-filesystems[1168]: Found vda6 May 17 00:43:00.522807 extend-filesystems[1168]: Found vda7 May 17 00:43:00.523676 extend-filesystems[1168]: Found vda9 May 17 00:43:00.523676 extend-filesystems[1168]: Checking size of /dev/vda9 May 17 00:43:00.542848 extend-filesystems[1168]: Resized partition /dev/vda9 May 17 00:43:00.548503 extend-filesystems[1202]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:43:00.565709 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks May 17 00:43:00.608581 update_engine[1183]: I0517 00:43:00.607991 1183 main.cc:92] Flatcar Update Engine starting May 17 00:43:00.616758 update_engine[1183]: I0517 00:43:00.613199 1183 update_check_scheduler.cc:74] Next update check in 3m33s May 17 00:43:00.613282 systemd[1]: Started update-engine.service. May 17 00:43:00.616027 systemd[1]: Started locksmithd.service. May 17 00:43:00.653113 systemd-logind[1174]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:43:00.653736 systemd-logind[1174]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:43:00.656067 systemd-logind[1174]: New seat seat0. May 17 00:43:00.661979 systemd[1]: Started systemd-logind.service. May 17 00:43:00.679312 bash[1217]: Updated "/home/core/.ssh/authorized_keys" May 17 00:43:00.680303 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:43:00.688766 kernel: EXT4-fs (vda9): resized filesystem to 15121403 May 17 00:43:00.719846 env[1187]: time="2025-05-17T00:43:00.719728312Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:43:00.721680 extend-filesystems[1202]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 17 00:43:00.721680 extend-filesystems[1202]: old_desc_blocks = 1, new_desc_blocks = 8 May 17 00:43:00.721680 extend-filesystems[1202]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. May 17 00:43:00.725962 extend-filesystems[1168]: Resized filesystem in /dev/vda9 May 17 00:43:00.725962 extend-filesystems[1168]: Found vdb May 17 00:43:00.723473 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:43:00.723755 systemd[1]: Finished extend-filesystems.service. May 17 00:43:00.767049 coreos-metadata[1163]: May 17 00:43:00.766 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:43:00.775969 systemd-networkd[998]: eth0: Gained IPv6LL May 17 00:43:00.783431 coreos-metadata[1163]: May 17 00:43:00.783 INFO Fetch successful May 17 00:43:00.790966 unknown[1163]: wrote ssh authorized keys file for user: core May 17 00:43:00.806110 update-ssh-keys[1221]: Updated "/home/core/.ssh/authorized_keys" May 17 00:43:00.806633 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 17 00:43:00.812588 env[1187]: time="2025-05-17T00:43:00.811345250Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:43:00.812588 env[1187]: time="2025-05-17T00:43:00.811541725Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:43:00.819732 env[1187]: time="2025-05-17T00:43:00.819063308Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:43:00.819732 env[1187]: time="2025-05-17T00:43:00.819123108Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:43:00.819732 env[1187]: time="2025-05-17T00:43:00.819465642Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:43:00.819732 env[1187]: time="2025-05-17T00:43:00.819502048Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:43:00.819732 env[1187]: time="2025-05-17T00:43:00.819518548Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:43:00.819732 env[1187]: time="2025-05-17T00:43:00.819528943Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:43:00.819732 env[1187]: time="2025-05-17T00:43:00.819681007Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:43:00.820102 env[1187]: time="2025-05-17T00:43:00.820032801Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:43:00.820279 env[1187]: time="2025-05-17T00:43:00.820250485Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:43:00.820279 env[1187]: time="2025-05-17T00:43:00.820274328Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:43:00.820382 env[1187]: time="2025-05-17T00:43:00.820364924Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:43:00.820426 env[1187]: time="2025-05-17T00:43:00.820381970Z" level=info msg="metadata content store policy set" policy=shared May 17 00:43:00.830690 env[1187]: time="2025-05-17T00:43:00.830593724Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:43:00.830690 env[1187]: time="2025-05-17T00:43:00.830660594Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:43:00.830690 env[1187]: time="2025-05-17T00:43:00.830681055Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:43:00.830992 env[1187]: time="2025-05-17T00:43:00.830733670Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:43:00.830992 env[1187]: time="2025-05-17T00:43:00.830748551Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:43:00.830992 env[1187]: time="2025-05-17T00:43:00.830763888Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:43:00.830992 env[1187]: time="2025-05-17T00:43:00.830814844Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:43:00.830992 env[1187]: time="2025-05-17T00:43:00.830830288Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:43:00.830992 env[1187]: time="2025-05-17T00:43:00.830845641Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:43:00.830992 env[1187]: time="2025-05-17T00:43:00.830864451Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:43:00.830992 env[1187]: time="2025-05-17T00:43:00.830881823Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:43:00.830992 env[1187]: time="2025-05-17T00:43:00.830895117Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:43:00.831290 env[1187]: time="2025-05-17T00:43:00.831057580Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:43:00.831290 env[1187]: time="2025-05-17T00:43:00.831151014Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:43:00.831931 env[1187]: time="2025-05-17T00:43:00.831563354Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:43:00.831931 env[1187]: time="2025-05-17T00:43:00.831609563Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:43:00.831931 env[1187]: time="2025-05-17T00:43:00.831626880Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:43:00.831931 env[1187]: time="2025-05-17T00:43:00.831689028Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:43:00.831931 env[1187]: time="2025-05-17T00:43:00.831703778Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:43:00.831931 env[1187]: time="2025-05-17T00:43:00.831716440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:43:00.831931 env[1187]: time="2025-05-17T00:43:00.831728196Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:43:00.831931 env[1187]: time="2025-05-17T00:43:00.831741191Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:43:00.831931 env[1187]: time="2025-05-17T00:43:00.831753298Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:43:00.831931 env[1187]: time="2025-05-17T00:43:00.831764108Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:43:00.831931 env[1187]: time="2025-05-17T00:43:00.831775429Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:43:00.831931 env[1187]: time="2025-05-17T00:43:00.831788417Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:43:00.832518 env[1187]: time="2025-05-17T00:43:00.831975439Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:43:00.832518 env[1187]: time="2025-05-17T00:43:00.832001993Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:43:00.832518 env[1187]: time="2025-05-17T00:43:00.832018541Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:43:00.832518 env[1187]: time="2025-05-17T00:43:00.832034381Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:43:00.832518 env[1187]: time="2025-05-17T00:43:00.832058855Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:43:00.832518 env[1187]: time="2025-05-17T00:43:00.832074598Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:43:00.832518 env[1187]: time="2025-05-17T00:43:00.832098309Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:43:00.832518 env[1187]: time="2025-05-17T00:43:00.832144714Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:43:00.833327 env[1187]: time="2025-05-17T00:43:00.832406212Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:43:00.833327 env[1187]: time="2025-05-17T00:43:00.832485328Z" level=info msg="Connect containerd service" May 17 00:43:00.833327 env[1187]: time="2025-05-17T00:43:00.832536847Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:43:00.840306 env[1187]: time="2025-05-17T00:43:00.833340500Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:43:00.840306 env[1187]: time="2025-05-17T00:43:00.833743550Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:43:00.840306 env[1187]: time="2025-05-17T00:43:00.833821126Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:43:00.840306 env[1187]: time="2025-05-17T00:43:00.833914655Z" level=info msg="containerd successfully booted in 0.142023s" May 17 00:43:00.834414 systemd[1]: Started containerd.service. May 17 00:43:00.863736 env[1187]: time="2025-05-17T00:43:00.862243520Z" level=info msg="Start subscribing containerd event" May 17 00:43:00.863736 env[1187]: time="2025-05-17T00:43:00.862325793Z" level=info msg="Start recovering state" May 17 00:43:00.863736 env[1187]: time="2025-05-17T00:43:00.862430001Z" level=info msg="Start event monitor" May 17 00:43:00.863736 env[1187]: time="2025-05-17T00:43:00.862445327Z" level=info msg="Start snapshots syncer" May 17 00:43:00.863736 env[1187]: time="2025-05-17T00:43:00.862456180Z" level=info msg="Start cni network conf syncer for default" May 17 00:43:00.863736 env[1187]: time="2025-05-17T00:43:00.862463177Z" level=info msg="Start streaming server" May 17 00:43:01.105299 locksmithd[1212]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:43:02.044279 systemd[1]: Started kubelet.service. May 17 00:43:02.074659 systemd[1]: Created slice system-sshd.slice. May 17 00:43:02.128476 sshd_keygen[1177]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:43:02.160975 systemd[1]: Finished sshd-keygen.service. May 17 00:43:02.164569 systemd[1]: Starting issuegen.service... May 17 00:43:02.168181 systemd[1]: Started sshd@0-137.184.33.91:22-147.75.109.163:47024.service. May 17 00:43:02.183969 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:43:02.184277 systemd[1]: Finished issuegen.service. May 17 00:43:02.188096 systemd[1]: Starting systemd-user-sessions.service... May 17 00:43:02.205767 systemd[1]: Finished systemd-user-sessions.service. May 17 00:43:02.209150 systemd[1]: Started getty@tty1.service. May 17 00:43:02.213509 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:43:02.214859 systemd[1]: Reached target getty.target. May 17 00:43:02.216213 systemd[1]: Reached target multi-user.target. May 17 00:43:02.220708 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:43:02.237875 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:43:02.238130 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:43:02.239195 systemd[1]: Startup finished in 1.023s (kernel) + 5.239s (initrd) + 8.141s (userspace) = 14.403s. May 17 00:43:02.290460 sshd[1243]: Accepted publickey for core from 147.75.109.163 port 47024 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:02.292876 sshd[1243]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:02.306447 systemd[1]: Created slice user-500.slice. May 17 00:43:02.308058 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:43:02.315551 systemd-logind[1174]: New session 1 of user core. May 17 00:43:02.328220 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:43:02.330909 systemd[1]: Starting user@500.service... May 17 00:43:02.337825 (systemd)[1258]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:02.439364 systemd[1258]: Queued start job for default target default.target. May 17 00:43:02.440265 systemd[1258]: Reached target paths.target. May 17 00:43:02.440288 systemd[1258]: Reached target sockets.target. May 17 00:43:02.440302 systemd[1258]: Reached target timers.target. May 17 00:43:02.440314 systemd[1258]: Reached target basic.target. May 17 00:43:02.440465 systemd[1]: Started user@500.service. May 17 00:43:02.442160 systemd[1]: Started session-1.scope. May 17 00:43:02.442674 systemd[1258]: Reached target default.target. May 17 00:43:02.442958 systemd[1258]: Startup finished in 92ms. May 17 00:43:02.510358 systemd[1]: Started sshd@1-137.184.33.91:22-147.75.109.163:47040.service. May 17 00:43:02.575188 sshd[1267]: Accepted publickey for core from 147.75.109.163 port 47040 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:02.577700 sshd[1267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:02.591742 systemd-logind[1174]: New session 2 of user core. May 17 00:43:02.592723 systemd[1]: Started session-2.scope. May 17 00:43:02.666545 sshd[1267]: pam_unix(sshd:session): session closed for user core May 17 00:43:02.675639 systemd[1]: Started sshd@2-137.184.33.91:22-147.75.109.163:47050.service. May 17 00:43:02.676866 systemd-logind[1174]: Session 2 logged out. Waiting for processes to exit. May 17 00:43:02.677152 systemd[1]: sshd@1-137.184.33.91:22-147.75.109.163:47040.service: Deactivated successfully. May 17 00:43:02.678412 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:43:02.682076 systemd-logind[1174]: Removed session 2. May 17 00:43:02.737560 sshd[1272]: Accepted publickey for core from 147.75.109.163 port 47050 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:02.739614 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:02.747924 systemd[1]: Started session-3.scope. May 17 00:43:02.748549 systemd-logind[1174]: New session 3 of user core. May 17 00:43:02.813961 sshd[1272]: pam_unix(sshd:session): session closed for user core May 17 00:43:02.819765 systemd[1]: Started sshd@3-137.184.33.91:22-147.75.109.163:47054.service. May 17 00:43:02.820690 systemd[1]: sshd@2-137.184.33.91:22-147.75.109.163:47050.service: Deactivated successfully. May 17 00:43:02.823172 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:43:02.824324 systemd-logind[1174]: Session 3 logged out. Waiting for processes to exit. May 17 00:43:02.825970 systemd-logind[1174]: Removed session 3. May 17 00:43:02.876633 sshd[1278]: Accepted publickey for core from 147.75.109.163 port 47054 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:02.879666 sshd[1278]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:02.889592 systemd[1]: Started session-4.scope. May 17 00:43:02.891753 systemd-logind[1174]: New session 4 of user core. May 17 00:43:02.952536 kubelet[1233]: E0517 00:43:02.952336 1233 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:43:02.955023 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:43:02.955170 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:43:02.955451 systemd[1]: kubelet.service: Consumed 1.491s CPU time. May 17 00:43:02.960471 sshd[1278]: pam_unix(sshd:session): session closed for user core May 17 00:43:02.967342 systemd[1]: sshd@3-137.184.33.91:22-147.75.109.163:47054.service: Deactivated successfully. May 17 00:43:02.968345 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:43:02.969214 systemd-logind[1174]: Session 4 logged out. Waiting for processes to exit. May 17 00:43:02.971202 systemd[1]: Started sshd@4-137.184.33.91:22-147.75.109.163:47070.service. May 17 00:43:02.976162 systemd-logind[1174]: Removed session 4. May 17 00:43:03.024977 sshd[1285]: Accepted publickey for core from 147.75.109.163 port 47070 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:03.027903 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:03.036037 systemd[1]: Started session-5.scope. May 17 00:43:03.037758 systemd-logind[1174]: New session 5 of user core. May 17 00:43:03.117928 sudo[1288]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:43:03.118772 sudo[1288]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:43:03.128021 dbus-daemon[1164]: \xd0\xfd\xc2\xcf\u0005V: received setenforce notice (enforcing=-903630384) May 17 00:43:03.131175 sudo[1288]: pam_unix(sudo:session): session closed for user root May 17 00:43:03.137131 sshd[1285]: pam_unix(sshd:session): session closed for user core May 17 00:43:03.144301 systemd[1]: Started sshd@5-137.184.33.91:22-147.75.109.163:47076.service. May 17 00:43:03.145851 systemd[1]: sshd@4-137.184.33.91:22-147.75.109.163:47070.service: Deactivated successfully. May 17 00:43:03.147065 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:43:03.148906 systemd-logind[1174]: Session 5 logged out. Waiting for processes to exit. May 17 00:43:03.150686 systemd-logind[1174]: Removed session 5. May 17 00:43:03.199021 sshd[1291]: Accepted publickey for core from 147.75.109.163 port 47076 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:03.201095 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:03.206728 systemd-logind[1174]: New session 6 of user core. May 17 00:43:03.207685 systemd[1]: Started session-6.scope. May 17 00:43:03.268402 sudo[1296]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:43:03.268704 sudo[1296]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:43:03.273352 sudo[1296]: pam_unix(sudo:session): session closed for user root May 17 00:43:03.281107 sudo[1295]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:43:03.281868 sudo[1295]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:43:03.295368 systemd[1]: Stopping audit-rules.service... May 17 00:43:03.296000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:43:03.296000 audit[1299]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff19491a00 a2=420 a3=0 items=0 ppid=1 pid=1299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:03.296000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:43:03.297151 auditctl[1299]: No rules May 17 00:43:03.297570 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:43:03.297821 systemd[1]: Stopped audit-rules.service. May 17 00:43:03.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:03.300118 systemd[1]: Starting audit-rules.service... May 17 00:43:03.327918 augenrules[1316]: No rules May 17 00:43:03.329176 systemd[1]: Finished audit-rules.service. May 17 00:43:03.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:03.331486 sudo[1295]: pam_unix(sudo:session): session closed for user root May 17 00:43:03.329000 audit[1295]: USER_END pid=1295 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:43:03.330000 audit[1295]: CRED_DISP pid=1295 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:43:03.334918 sshd[1291]: pam_unix(sshd:session): session closed for user core May 17 00:43:03.337000 audit[1291]: USER_END pid=1291 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:03.337000 audit[1291]: CRED_DISP pid=1291 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:03.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-137.184.33.91:22-147.75.109.163:47076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:03.340355 systemd[1]: sshd@5-137.184.33.91:22-147.75.109.163:47076.service: Deactivated successfully. May 17 00:43:03.341207 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:43:03.342131 systemd-logind[1174]: Session 6 logged out. Waiting for processes to exit. May 17 00:43:03.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-137.184.33.91:22-147.75.109.163:47084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:03.344086 systemd[1]: Started sshd@6-137.184.33.91:22-147.75.109.163:47084.service. May 17 00:43:03.348754 systemd-logind[1174]: Removed session 6. May 17 00:43:03.392000 audit[1322]: USER_ACCT pid=1322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:03.393826 sshd[1322]: Accepted publickey for core from 147.75.109.163 port 47084 ssh2: RSA SHA256:EX9BYXX2dlhNNVyZl0biBFe+Nt3dwNpfc+iXRVj1d0w May 17 00:43:03.395000 audit[1322]: CRED_ACQ pid=1322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:03.395000 audit[1322]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc8946b50 a2=3 a3=0 items=0 ppid=1 pid=1322 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:03.395000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:43:03.396953 sshd[1322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:43:03.403165 systemd-logind[1174]: New session 7 of user core. May 17 00:43:03.404595 systemd[1]: Started session-7.scope. May 17 00:43:03.409000 audit[1322]: USER_START pid=1322 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:03.412000 audit[1324]: CRED_ACQ pid=1324 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:03.465000 audit[1325]: USER_ACCT pid=1325 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:43:03.466565 sudo[1325]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:43:03.466000 audit[1325]: CRED_REFR pid=1325 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:43:03.467293 sudo[1325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:43:03.469000 audit[1325]: USER_START pid=1325 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:43:03.487835 systemd[1]: Starting coreos-metadata.service... May 17 00:43:03.554512 coreos-metadata[1329]: May 17 00:43:03.554 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 17 00:43:03.565316 coreos-metadata[1329]: May 17 00:43:03.565 INFO Fetch successful May 17 00:43:03.578607 systemd[1]: Finished coreos-metadata.service. May 17 00:43:03.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:04.395441 systemd[1]: Stopped kubelet.service. May 17 00:43:04.396131 systemd[1]: kubelet.service: Consumed 1.491s CPU time. May 17 00:43:04.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:04.397272 kernel: kauditd_printk_skb: 203 callbacks suppressed May 17 00:43:04.397329 kernel: audit: type=1130 audit(1747442584.395:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:04.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:04.399164 systemd[1]: Starting kubelet.service... May 17 00:43:04.402919 kernel: audit: type=1131 audit(1747442584.395:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:04.441570 systemd[1]: Reloading. May 17 00:43:04.578278 /usr/lib/systemd/system-generators/torcx-generator[1384]: time="2025-05-17T00:43:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:43:04.578308 /usr/lib/systemd/system-generators/torcx-generator[1384]: time="2025-05-17T00:43:04Z" level=info msg="torcx already run" May 17 00:43:04.683249 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:43:04.683273 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:43:04.708593 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:43:04.800228 kernel: audit: type=1400 audit(1747442584.794:243): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.800442 kernel: audit: type=1400 audit(1747442584.794:244): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.800485 kernel: audit: type=1400 audit(1747442584.794:245): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.808689 kernel: audit: type=1400 audit(1747442584.794:246): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.808862 kernel: audit: type=1400 audit(1747442584.794:247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.808910 kernel: audit: type=1400 audit(1747442584.794:248): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.813528 kernel: audit: type=1400 audit(1747442584.794:249): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.813779 kernel: audit: type=1400 audit(1747442584.794:250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.797000 audit: BPF prog-id=46 op=LOAD May 17 00:43:04.797000 audit: BPF prog-id=39 op=UNLOAD May 17 00:43:04.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit: BPF prog-id=47 op=LOAD May 17 00:43:04.802000 audit: BPF prog-id=30 op=UNLOAD May 17 00:43:04.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit: BPF prog-id=48 op=LOAD May 17 00:43:04.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.802000 audit: BPF prog-id=49 op=LOAD May 17 00:43:04.802000 audit: BPF prog-id=31 op=UNLOAD May 17 00:43:04.802000 audit: BPF prog-id=32 op=UNLOAD May 17 00:43:04.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit: BPF prog-id=50 op=LOAD May 17 00:43:04.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.816000 audit: BPF prog-id=51 op=LOAD May 17 00:43:04.816000 audit: BPF prog-id=33 op=UNLOAD May 17 00:43:04.816000 audit: BPF prog-id=34 op=UNLOAD May 17 00:43:04.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.819000 audit: BPF prog-id=52 op=LOAD May 17 00:43:04.819000 audit: BPF prog-id=44 op=UNLOAD May 17 00:43:04.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.820000 audit: BPF prog-id=53 op=LOAD May 17 00:43:04.820000 audit: BPF prog-id=40 op=UNLOAD May 17 00:43:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit: BPF prog-id=54 op=LOAD May 17 00:43:04.821000 audit: BPF prog-id=35 op=UNLOAD May 17 00:43:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit: BPF prog-id=55 op=LOAD May 17 00:43:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.821000 audit: BPF prog-id=56 op=LOAD May 17 00:43:04.821000 audit: BPF prog-id=36 op=UNLOAD May 17 00:43:04.821000 audit: BPF prog-id=37 op=UNLOAD May 17 00:43:04.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit: BPF prog-id=57 op=LOAD May 17 00:43:04.823000 audit: BPF prog-id=41 op=UNLOAD May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit: BPF prog-id=58 op=LOAD May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit: BPF prog-id=59 op=LOAD May 17 00:43:04.823000 audit: BPF prog-id=42 op=UNLOAD May 17 00:43:04.823000 audit: BPF prog-id=43 op=UNLOAD May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:04.823000 audit: BPF prog-id=60 op=LOAD May 17 00:43:04.823000 audit: BPF prog-id=38 op=UNLOAD May 17 00:43:04.856437 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 00:43:04.856562 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 00:43:04.857034 systemd[1]: Stopped kubelet.service. May 17 00:43:04.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:43:04.861208 systemd[1]: Starting kubelet.service... May 17 00:43:04.999259 systemd[1]: Started kubelet.service. May 17 00:43:04.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:05.064394 kubelet[1436]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:43:05.064394 kubelet[1436]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:43:05.064394 kubelet[1436]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:43:05.064986 kubelet[1436]: I0517 00:43:05.064440 1436 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:43:05.381007 kubelet[1436]: I0517 00:43:05.380800 1436 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:43:05.381007 kubelet[1436]: I0517 00:43:05.380855 1436 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:43:05.382690 kubelet[1436]: I0517 00:43:05.381830 1436 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:43:05.416441 kubelet[1436]: I0517 00:43:05.416390 1436 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:43:05.451319 kubelet[1436]: E0517 00:43:05.451224 1436 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:43:05.451319 kubelet[1436]: I0517 00:43:05.451320 1436 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:43:05.455951 kubelet[1436]: I0517 00:43:05.455906 1436 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:43:05.456246 kubelet[1436]: I0517 00:43:05.456210 1436 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:43:05.456519 kubelet[1436]: I0517 00:43:05.456246 1436 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"137.184.33.91","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:43:05.456685 kubelet[1436]: I0517 00:43:05.456526 1436 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:43:05.456685 kubelet[1436]: I0517 00:43:05.456541 1436 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:43:05.456763 kubelet[1436]: I0517 00:43:05.456730 1436 state_mem.go:36] "Initialized new in-memory state store" May 17 00:43:05.459832 kubelet[1436]: I0517 00:43:05.459767 1436 kubelet.go:480] "Attempting to sync node with API server" May 17 00:43:05.460324 kubelet[1436]: I0517 00:43:05.460271 1436 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:43:05.460432 kubelet[1436]: I0517 00:43:05.460351 1436 kubelet.go:386] "Adding apiserver pod source" May 17 00:43:05.462305 kubelet[1436]: E0517 00:43:05.462236 1436 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:05.462547 kubelet[1436]: I0517 00:43:05.462516 1436 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:43:05.462732 kubelet[1436]: E0517 00:43:05.462710 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:05.472217 kubelet[1436]: I0517 00:43:05.472147 1436 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:43:05.472865 kubelet[1436]: I0517 00:43:05.472826 1436 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:43:05.473906 kubelet[1436]: W0517 00:43:05.473849 1436 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:43:05.476024 kubelet[1436]: E0517 00:43:05.475971 1436 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:43:05.476486 kubelet[1436]: E0517 00:43:05.476441 1436 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: nodes \"137.184.33.91\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:43:05.477465 kubelet[1436]: I0517 00:43:05.477437 1436 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:43:05.477572 kubelet[1436]: I0517 00:43:05.477513 1436 server.go:1289] "Started kubelet" May 17 00:43:05.479593 kubelet[1436]: I0517 00:43:05.479512 1436 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:43:05.481139 kubelet[1436]: I0517 00:43:05.481104 1436 server.go:317] "Adding debug handlers to kubelet server" May 17 00:43:05.483167 kubelet[1436]: I0517 00:43:05.483073 1436 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:43:05.483611 kubelet[1436]: I0517 00:43:05.483587 1436 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:43:05.487735 kubelet[1436]: E0517 00:43:05.487643 1436 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:43:05.488000 audit[1436]: AVC avc: denied { mac_admin } for pid=1436 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:05.488000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:43:05.488000 audit[1436]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009228d0 a1=c000924648 a2=c0009228a0 a3=25 items=0 ppid=1 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.490044 kubelet[1436]: I0517 00:43:05.490003 1436 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:43:05.490227 kubelet[1436]: I0517 00:43:05.490202 1436 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:43:05.488000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:43:05.489000 audit[1436]: AVC avc: denied { mac_admin } for pid=1436 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:05.489000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:43:05.489000 audit[1436]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008f8780 a1=c000924660 a2=c000922960 a3=25 items=0 ppid=1 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.489000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:43:05.490788 kubelet[1436]: I0517 00:43:05.490761 1436 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:43:05.492138 kubelet[1436]: I0517 00:43:05.492093 1436 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:43:05.494032 kubelet[1436]: E0517 00:43:05.488861 1436 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{137.184.33.91.184029c5ecc652a8 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:137.184.33.91,UID:137.184.33.91,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:137.184.33.91,},FirstTimestamp:2025-05-17 00:43:05.47746884 +0000 UTC m=+0.465620023,LastTimestamp:2025-05-17 00:43:05.47746884 +0000 UTC m=+0.465620023,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:137.184.33.91,}" May 17 00:43:05.496021 kubelet[1436]: E0517 00:43:05.495984 1436 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"137.184.33.91\" not found" May 17 00:43:05.496021 kubelet[1436]: I0517 00:43:05.496020 1436 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:43:05.496345 kubelet[1436]: I0517 00:43:05.496322 1436 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:43:05.496415 kubelet[1436]: I0517 00:43:05.496397 1436 reconciler.go:26] "Reconciler: start to sync state" May 17 00:43:05.497333 kubelet[1436]: I0517 00:43:05.497303 1436 factory.go:223] Registration of the systemd container factory successfully May 17 00:43:05.497473 kubelet[1436]: I0517 00:43:05.497407 1436 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:43:05.498668 kubelet[1436]: E0517 00:43:05.498605 1436 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:43:05.499119 kubelet[1436]: E0517 00:43:05.498966 1436 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{137.184.33.91.184029c5ed611aa3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:137.184.33.91,UID:137.184.33.91,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:137.184.33.91,},FirstTimestamp:2025-05-17 00:43:05.487612579 +0000 UTC m=+0.475763758,LastTimestamp:2025-05-17 00:43:05.487612579 +0000 UTC m=+0.475763758,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:137.184.33.91,}" May 17 00:43:05.503539 kubelet[1436]: I0517 00:43:05.503499 1436 factory.go:223] Registration of the containerd container factory successfully May 17 00:43:05.507885 kubelet[1436]: E0517 00:43:05.507804 1436 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"137.184.33.91\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" May 17 00:43:05.539475 kubelet[1436]: I0517 00:43:05.539439 1436 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:43:05.539941 kubelet[1436]: I0517 00:43:05.539915 1436 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:43:05.540105 kubelet[1436]: I0517 00:43:05.540090 1436 state_mem.go:36] "Initialized new in-memory state store" May 17 00:43:05.544746 kubelet[1436]: I0517 00:43:05.544698 1436 policy_none.go:49] "None policy: Start" May 17 00:43:05.544996 kubelet[1436]: I0517 00:43:05.544972 1436 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:43:05.545164 kubelet[1436]: I0517 00:43:05.545149 1436 state_mem.go:35] "Initializing new in-memory state store" May 17 00:43:05.554573 systemd[1]: Created slice kubepods.slice. May 17 00:43:05.561000 audit[1458]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:05.561000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcfba36810 a2=0 a3=7ffcfba367fc items=0 ppid=1436 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:43:05.565805 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:43:05.564000 audit[1459]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:05.564000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff9c5787f0 a2=0 a3=7fff9c5787dc items=0 ppid=1436 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.564000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:43:05.571123 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:43:05.577910 kubelet[1436]: E0517 00:43:05.577868 1436 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:43:05.577000 audit[1436]: AVC avc: denied { mac_admin } for pid=1436 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:05.577000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:43:05.577000 audit[1436]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dc86c0 a1=c000de83d8 a2=c000dc8690 a3=25 items=0 ppid=1 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.577000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:43:05.578600 kubelet[1436]: E0517 00:43:05.578568 1436 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:43:05.579059 kubelet[1436]: I0517 00:43:05.579035 1436 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:43:05.579239 kubelet[1436]: I0517 00:43:05.579180 1436 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:43:05.581027 kubelet[1436]: I0517 00:43:05.580999 1436 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:43:05.584167 kubelet[1436]: E0517 00:43:05.584134 1436 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:43:05.584316 kubelet[1436]: E0517 00:43:05.584189 1436 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"137.184.33.91\" not found" May 17 00:43:05.573000 audit[1461]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:05.573000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffed62fa340 a2=0 a3=7ffed62fa32c items=0 ppid=1436 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:43:05.599000 audit[1466]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:05.599000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe97205c00 a2=0 a3=7ffe97205bec items=0 ppid=1436 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:43:05.655000 audit[1471]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:05.655000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe26005ed0 a2=0 a3=7ffe26005ebc items=0 ppid=1436 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:43:05.657000 audit[1472]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:05.657000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce5e5d9f0 a2=0 a3=7ffce5e5d9dc items=0 ppid=1436 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.657000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:43:05.659000 audit[1473]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:05.659000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe6c1ff490 a2=0 a3=7ffe6c1ff47c items=0 ppid=1436 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:43:05.662104 kubelet[1436]: I0517 00:43:05.657760 1436 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:43:05.662104 kubelet[1436]: I0517 00:43:05.661515 1436 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:43:05.662104 kubelet[1436]: I0517 00:43:05.661546 1436 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:43:05.662104 kubelet[1436]: I0517 00:43:05.661577 1436 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:43:05.662104 kubelet[1436]: I0517 00:43:05.661589 1436 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:43:05.662104 kubelet[1436]: E0517 00:43:05.661746 1436 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 17 00:43:05.662000 audit[1475]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:05.662000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf94346d0 a2=0 a3=7ffcf94346bc items=0 ppid=1436 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.662000 audit[1474]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:05.662000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd5b7ae740 a2=0 a3=7ffd5b7ae72c items=0 ppid=1436 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.662000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:43:05.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:43:05.664000 audit[1476]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:05.664000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2dbfbb50 a2=0 a3=7fff2dbfbb3c items=0 ppid=1436 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:43:05.665000 audit[1477]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:05.665000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff2b890970 a2=0 a3=7fff2b89095c items=0 ppid=1436 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:43:05.666000 audit[1478]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:05.666000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff03838700 a2=0 a3=7fff038386ec items=0 ppid=1436 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:05.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:43:05.680923 kubelet[1436]: I0517 00:43:05.680884 1436 kubelet_node_status.go:75] "Attempting to register node" node="137.184.33.91" May 17 00:43:05.698153 kubelet[1436]: I0517 00:43:05.698103 1436 kubelet_node_status.go:78] "Successfully registered node" node="137.184.33.91" May 17 00:43:05.698153 kubelet[1436]: E0517 00:43:05.698137 1436 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"137.184.33.91\": node \"137.184.33.91\" not found" May 17 00:43:05.713886 kubelet[1436]: E0517 00:43:05.713842 1436 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"137.184.33.91\" not found" May 17 00:43:05.814405 kubelet[1436]: E0517 00:43:05.814341 1436 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"137.184.33.91\" not found" May 17 00:43:05.916235 kubelet[1436]: E0517 00:43:05.915129 1436 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"137.184.33.91\" not found" May 17 00:43:06.016253 kubelet[1436]: E0517 00:43:06.016198 1436 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"137.184.33.91\" not found" May 17 00:43:06.116973 kubelet[1436]: E0517 00:43:06.116906 1436 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"137.184.33.91\" not found" May 17 00:43:06.217772 kubelet[1436]: E0517 00:43:06.217622 1436 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"137.184.33.91\" not found" May 17 00:43:06.318558 kubelet[1436]: E0517 00:43:06.318483 1436 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"137.184.33.91\" not found" May 17 00:43:06.385860 kubelet[1436]: I0517 00:43:06.385778 1436 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 17 00:43:06.386465 kubelet[1436]: I0517 00:43:06.386414 1436 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" May 17 00:43:06.418986 kubelet[1436]: E0517 00:43:06.418907 1436 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"137.184.33.91\" not found" May 17 00:43:06.463156 kubelet[1436]: E0517 00:43:06.463108 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:06.519594 kubelet[1436]: E0517 00:43:06.519446 1436 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"137.184.33.91\" not found" May 17 00:43:06.591000 audit[1325]: USER_END pid=1325 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:43:06.591000 audit[1325]: CRED_DISP pid=1325 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:43:06.592784 sudo[1325]: pam_unix(sudo:session): session closed for user root May 17 00:43:06.596418 sshd[1322]: pam_unix(sshd:session): session closed for user core May 17 00:43:06.596000 audit[1322]: USER_END pid=1322 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:06.596000 audit[1322]: CRED_DISP pid=1322 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:43:06.599946 systemd[1]: sshd@6-137.184.33.91:22-147.75.109.163:47084.service: Deactivated successfully. May 17 00:43:06.600863 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:43:06.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-137.184.33.91:22-147.75.109.163:47084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:06.601861 systemd-logind[1174]: Session 7 logged out. Waiting for processes to exit. May 17 00:43:06.603352 systemd-logind[1174]: Removed session 7. May 17 00:43:06.620374 kubelet[1436]: E0517 00:43:06.620315 1436 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"137.184.33.91\" not found" May 17 00:43:06.721133 kubelet[1436]: E0517 00:43:06.721077 1436 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"137.184.33.91\" not found" May 17 00:43:06.822363 kubelet[1436]: E0517 00:43:06.822201 1436 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"137.184.33.91\" not found" May 17 00:43:06.923938 kubelet[1436]: I0517 00:43:06.923893 1436 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 17 00:43:06.924527 env[1187]: time="2025-05-17T00:43:06.924417261Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:43:06.924932 kubelet[1436]: I0517 00:43:06.924671 1436 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 17 00:43:07.464212 kubelet[1436]: E0517 00:43:07.464104 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:07.464212 kubelet[1436]: I0517 00:43:07.464190 1436 apiserver.go:52] "Watching apiserver" May 17 00:43:07.476465 kubelet[1436]: E0517 00:43:07.476388 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6lqkv" podUID="1a3ba9f2-6638-45de-97a2-7ec41db800d6" May 17 00:43:07.480880 systemd[1]: Created slice kubepods-besteffort-poda25f68f4_7477_437e_a3e4_43bf9807dc73.slice. May 17 00:43:07.491842 systemd[1]: Created slice kubepods-besteffort-pod187392ab_d7d4_4798_ab8e_c17587ca8313.slice. May 17 00:43:07.498008 kubelet[1436]: I0517 00:43:07.497892 1436 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:43:07.508150 kubelet[1436]: I0517 00:43:07.508055 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a25f68f4-7477-437e-a3e4-43bf9807dc73-xtables-lock\") pod \"calico-node-zc8zb\" (UID: \"a25f68f4-7477-437e-a3e4-43bf9807dc73\") " pod="calico-system/calico-node-zc8zb" May 17 00:43:07.508150 kubelet[1436]: I0517 00:43:07.508105 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1a3ba9f2-6638-45de-97a2-7ec41db800d6-kubelet-dir\") pod \"csi-node-driver-6lqkv\" (UID: \"1a3ba9f2-6638-45de-97a2-7ec41db800d6\") " pod="calico-system/csi-node-driver-6lqkv" May 17 00:43:07.508150 kubelet[1436]: I0517 00:43:07.508128 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1a3ba9f2-6638-45de-97a2-7ec41db800d6-registration-dir\") pod \"csi-node-driver-6lqkv\" (UID: \"1a3ba9f2-6638-45de-97a2-7ec41db800d6\") " pod="calico-system/csi-node-driver-6lqkv" May 17 00:43:07.508150 kubelet[1436]: I0517 00:43:07.508149 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a25f68f4-7477-437e-a3e4-43bf9807dc73-cni-log-dir\") pod \"calico-node-zc8zb\" (UID: \"a25f68f4-7477-437e-a3e4-43bf9807dc73\") " pod="calico-system/calico-node-zc8zb" May 17 00:43:07.508150 kubelet[1436]: I0517 00:43:07.508167 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a25f68f4-7477-437e-a3e4-43bf9807dc73-cni-net-dir\") pod \"calico-node-zc8zb\" (UID: \"a25f68f4-7477-437e-a3e4-43bf9807dc73\") " pod="calico-system/calico-node-zc8zb" May 17 00:43:07.508592 kubelet[1436]: I0517 00:43:07.508183 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a25f68f4-7477-437e-a3e4-43bf9807dc73-var-lib-calico\") pod \"calico-node-zc8zb\" (UID: \"a25f68f4-7477-437e-a3e4-43bf9807dc73\") " pod="calico-system/calico-node-zc8zb" May 17 00:43:07.508592 kubelet[1436]: I0517 00:43:07.508207 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1a3ba9f2-6638-45de-97a2-7ec41db800d6-socket-dir\") pod \"csi-node-driver-6lqkv\" (UID: \"1a3ba9f2-6638-45de-97a2-7ec41db800d6\") " pod="calico-system/csi-node-driver-6lqkv" May 17 00:43:07.508592 kubelet[1436]: I0517 00:43:07.508223 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/187392ab-d7d4-4798-ab8e-c17587ca8313-kube-proxy\") pod \"kube-proxy-v9k62\" (UID: \"187392ab-d7d4-4798-ab8e-c17587ca8313\") " pod="kube-system/kube-proxy-v9k62" May 17 00:43:07.508592 kubelet[1436]: I0517 00:43:07.508250 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/187392ab-d7d4-4798-ab8e-c17587ca8313-xtables-lock\") pod \"kube-proxy-v9k62\" (UID: \"187392ab-d7d4-4798-ab8e-c17587ca8313\") " pod="kube-system/kube-proxy-v9k62" May 17 00:43:07.508592 kubelet[1436]: I0517 00:43:07.508290 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/187392ab-d7d4-4798-ab8e-c17587ca8313-lib-modules\") pod \"kube-proxy-v9k62\" (UID: \"187392ab-d7d4-4798-ab8e-c17587ca8313\") " pod="kube-system/kube-proxy-v9k62" May 17 00:43:07.509044 kubelet[1436]: I0517 00:43:07.508308 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a25f68f4-7477-437e-a3e4-43bf9807dc73-cni-bin-dir\") pod \"calico-node-zc8zb\" (UID: \"a25f68f4-7477-437e-a3e4-43bf9807dc73\") " pod="calico-system/calico-node-zc8zb" May 17 00:43:07.509044 kubelet[1436]: I0517 00:43:07.508322 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a25f68f4-7477-437e-a3e4-43bf9807dc73-flexvol-driver-host\") pod \"calico-node-zc8zb\" (UID: \"a25f68f4-7477-437e-a3e4-43bf9807dc73\") " pod="calico-system/calico-node-zc8zb" May 17 00:43:07.509044 kubelet[1436]: I0517 00:43:07.508350 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1a3ba9f2-6638-45de-97a2-7ec41db800d6-varrun\") pod \"csi-node-driver-6lqkv\" (UID: \"1a3ba9f2-6638-45de-97a2-7ec41db800d6\") " pod="calico-system/csi-node-driver-6lqkv" May 17 00:43:07.509044 kubelet[1436]: I0517 00:43:07.508372 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9ksm5\" (UniqueName: \"kubernetes.io/projected/1a3ba9f2-6638-45de-97a2-7ec41db800d6-kube-api-access-9ksm5\") pod \"csi-node-driver-6lqkv\" (UID: \"1a3ba9f2-6638-45de-97a2-7ec41db800d6\") " pod="calico-system/csi-node-driver-6lqkv" May 17 00:43:07.509044 kubelet[1436]: I0517 00:43:07.508395 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a25f68f4-7477-437e-a3e4-43bf9807dc73-lib-modules\") pod \"calico-node-zc8zb\" (UID: \"a25f68f4-7477-437e-a3e4-43bf9807dc73\") " pod="calico-system/calico-node-zc8zb" May 17 00:43:07.509214 kubelet[1436]: I0517 00:43:07.508415 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a25f68f4-7477-437e-a3e4-43bf9807dc73-node-certs\") pod \"calico-node-zc8zb\" (UID: \"a25f68f4-7477-437e-a3e4-43bf9807dc73\") " pod="calico-system/calico-node-zc8zb" May 17 00:43:07.509214 kubelet[1436]: I0517 00:43:07.508441 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a25f68f4-7477-437e-a3e4-43bf9807dc73-tigera-ca-bundle\") pod \"calico-node-zc8zb\" (UID: \"a25f68f4-7477-437e-a3e4-43bf9807dc73\") " pod="calico-system/calico-node-zc8zb" May 17 00:43:07.509214 kubelet[1436]: I0517 00:43:07.508464 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a25f68f4-7477-437e-a3e4-43bf9807dc73-var-run-calico\") pod \"calico-node-zc8zb\" (UID: \"a25f68f4-7477-437e-a3e4-43bf9807dc73\") " pod="calico-system/calico-node-zc8zb" May 17 00:43:07.509214 kubelet[1436]: I0517 00:43:07.508496 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k9mm4\" (UniqueName: \"kubernetes.io/projected/a25f68f4-7477-437e-a3e4-43bf9807dc73-kube-api-access-k9mm4\") pod \"calico-node-zc8zb\" (UID: \"a25f68f4-7477-437e-a3e4-43bf9807dc73\") " pod="calico-system/calico-node-zc8zb" May 17 00:43:07.509214 kubelet[1436]: I0517 00:43:07.508516 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-77whd\" (UniqueName: \"kubernetes.io/projected/187392ab-d7d4-4798-ab8e-c17587ca8313-kube-api-access-77whd\") pod \"kube-proxy-v9k62\" (UID: \"187392ab-d7d4-4798-ab8e-c17587ca8313\") " pod="kube-system/kube-proxy-v9k62" May 17 00:43:07.509379 kubelet[1436]: I0517 00:43:07.508538 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a25f68f4-7477-437e-a3e4-43bf9807dc73-policysync\") pod \"calico-node-zc8zb\" (UID: \"a25f68f4-7477-437e-a3e4-43bf9807dc73\") " pod="calico-system/calico-node-zc8zb" May 17 00:43:07.609847 kubelet[1436]: I0517 00:43:07.609787 1436 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:43:07.611814 kubelet[1436]: E0517 00:43:07.611781 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:07.611996 kubelet[1436]: W0517 00:43:07.611976 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:07.612076 kubelet[1436]: E0517 00:43:07.612062 1436 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:07.612404 kubelet[1436]: E0517 00:43:07.612388 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:07.612617 kubelet[1436]: W0517 00:43:07.612598 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:07.612740 kubelet[1436]: E0517 00:43:07.612725 1436 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:07.613332 kubelet[1436]: E0517 00:43:07.613313 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:07.613432 kubelet[1436]: W0517 00:43:07.613418 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:07.613511 kubelet[1436]: E0517 00:43:07.613498 1436 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:07.613898 kubelet[1436]: E0517 00:43:07.613879 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:07.613993 kubelet[1436]: W0517 00:43:07.613979 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:07.614074 kubelet[1436]: E0517 00:43:07.614061 1436 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:07.614424 kubelet[1436]: E0517 00:43:07.614409 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:07.614511 kubelet[1436]: W0517 00:43:07.614498 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:07.614573 kubelet[1436]: E0517 00:43:07.614561 1436 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:07.620864 kubelet[1436]: E0517 00:43:07.620554 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:07.620864 kubelet[1436]: W0517 00:43:07.620579 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:07.620864 kubelet[1436]: E0517 00:43:07.620601 1436 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:07.684117 kubelet[1436]: E0517 00:43:07.684072 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:07.684353 kubelet[1436]: W0517 00:43:07.684320 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:07.684499 kubelet[1436]: E0517 00:43:07.684472 1436 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:07.685147 kubelet[1436]: E0517 00:43:07.685120 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:07.685310 kubelet[1436]: W0517 00:43:07.685284 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:07.685469 kubelet[1436]: E0517 00:43:07.685444 1436 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:07.686679 kubelet[1436]: E0517 00:43:07.686615 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:43:07.686798 kubelet[1436]: W0517 00:43:07.686722 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:43:07.686798 kubelet[1436]: E0517 00:43:07.686745 1436 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:43:07.798573 kubelet[1436]: E0517 00:43:07.796617 1436 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:07.799702 env[1187]: time="2025-05-17T00:43:07.799519538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v9k62,Uid:187392ab-d7d4-4798-ab8e-c17587ca8313,Namespace:kube-system,Attempt:0,}" May 17 00:43:07.803029 env[1187]: time="2025-05-17T00:43:07.802561599Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zc8zb,Uid:a25f68f4-7477-437e-a3e4-43bf9807dc73,Namespace:calico-system,Attempt:0,}" May 17 00:43:08.285211 env[1187]: time="2025-05-17T00:43:08.285060128Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:08.288236 env[1187]: time="2025-05-17T00:43:08.288175378Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:08.289335 env[1187]: time="2025-05-17T00:43:08.289292712Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:08.290419 env[1187]: time="2025-05-17T00:43:08.290374674Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:08.295894 env[1187]: time="2025-05-17T00:43:08.295842996Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:08.299053 env[1187]: time="2025-05-17T00:43:08.299005745Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:08.301199 env[1187]: time="2025-05-17T00:43:08.301150334Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:08.302479 env[1187]: time="2025-05-17T00:43:08.302434618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:08.327199 env[1187]: time="2025-05-17T00:43:08.326166897Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:43:08.327199 env[1187]: time="2025-05-17T00:43:08.326227477Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:43:08.327199 env[1187]: time="2025-05-17T00:43:08.326243321Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:43:08.327199 env[1187]: time="2025-05-17T00:43:08.326641565Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/785f78504cbd30c8acf6335d4cd157fa58d6e4949ae97979f096775785d37c92 pid=1509 runtime=io.containerd.runc.v2 May 17 00:43:08.328992 env[1187]: time="2025-05-17T00:43:08.326185394Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:43:08.328992 env[1187]: time="2025-05-17T00:43:08.326233820Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:43:08.328992 env[1187]: time="2025-05-17T00:43:08.326250212Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:43:08.328992 env[1187]: time="2025-05-17T00:43:08.326640990Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d14bef72677ecc390e0e493b8de09e48ed0dad04f5c5d970fbea4aec0b674831 pid=1511 runtime=io.containerd.runc.v2 May 17 00:43:08.351284 systemd[1]: Started cri-containerd-d14bef72677ecc390e0e493b8de09e48ed0dad04f5c5d970fbea4aec0b674831.scope. May 17 00:43:08.369102 systemd[1]: Started cri-containerd-785f78504cbd30c8acf6335d4cd157fa58d6e4949ae97979f096775785d37c92.scope. May 17 00:43:08.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.391000 audit: BPF prog-id=61 op=LOAD May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1511 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:08.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431346265663732363737656363333930653065343933623864653039 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1511 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:08.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431346265663732363737656363333930653065343933623864653039 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit: BPF prog-id=62 op=LOAD May 17 00:43:08.392000 audit[1532]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002c7ce0 items=0 ppid=1511 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:08.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431346265663732363737656363333930653065343933623864653039 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit: BPF prog-id=63 op=LOAD May 17 00:43:08.392000 audit[1532]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0002c7d28 items=0 ppid=1511 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:08.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431346265663732363737656363333930653065343933623864653039 May 17 00:43:08.392000 audit: BPF prog-id=63 op=UNLOAD May 17 00:43:08.392000 audit: BPF prog-id=62 op=UNLOAD May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.392000 audit: BPF prog-id=64 op=LOAD May 17 00:43:08.392000 audit[1532]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000332138 items=0 ppid=1511 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:08.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431346265663732363737656363333930653065343933623864653039 May 17 00:43:08.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.413000 audit: BPF prog-id=65 op=LOAD May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1509 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:08.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738356637383530346362643330633861636636333335643463643135 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1509 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:08.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738356637383530346362643330633861636636333335643463643135 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit: BPF prog-id=66 op=LOAD May 17 00:43:08.414000 audit[1533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00038a6b0 items=0 ppid=1509 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:08.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738356637383530346362643330633861636636333335643463643135 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit: BPF prog-id=67 op=LOAD May 17 00:43:08.414000 audit[1533]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00038a6f8 items=0 ppid=1509 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:08.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738356637383530346362643330633861636636333335643463643135 May 17 00:43:08.414000 audit: BPF prog-id=67 op=UNLOAD May 17 00:43:08.414000 audit: BPF prog-id=66 op=UNLOAD May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:08.414000 audit: BPF prog-id=68 op=LOAD May 17 00:43:08.414000 audit[1533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038ab08 items=0 ppid=1509 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:08.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738356637383530346362643330633861636636333335643463643135 May 17 00:43:08.429548 env[1187]: time="2025-05-17T00:43:08.429486446Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zc8zb,Uid:a25f68f4-7477-437e-a3e4-43bf9807dc73,Namespace:calico-system,Attempt:0,} returns sandbox id \"d14bef72677ecc390e0e493b8de09e48ed0dad04f5c5d970fbea4aec0b674831\"" May 17 00:43:08.432438 env[1187]: time="2025-05-17T00:43:08.432395758Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:43:08.440985 env[1187]: time="2025-05-17T00:43:08.440928122Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v9k62,Uid:187392ab-d7d4-4798-ab8e-c17587ca8313,Namespace:kube-system,Attempt:0,} returns sandbox id \"785f78504cbd30c8acf6335d4cd157fa58d6e4949ae97979f096775785d37c92\"" May 17 00:43:08.442369 kubelet[1436]: E0517 00:43:08.442114 1436 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:08.464506 kubelet[1436]: E0517 00:43:08.464467 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:08.620459 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1157176800.mount: Deactivated successfully. May 17 00:43:09.465625 kubelet[1436]: E0517 00:43:09.465561 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:09.619276 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2778500005.mount: Deactivated successfully. May 17 00:43:09.663954 kubelet[1436]: E0517 00:43:09.662800 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6lqkv" podUID="1a3ba9f2-6638-45de-97a2-7ec41db800d6" May 17 00:43:09.788690 env[1187]: time="2025-05-17T00:43:09.788520234Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:09.790139 env[1187]: time="2025-05-17T00:43:09.790096940Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:09.791581 env[1187]: time="2025-05-17T00:43:09.791548590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:09.792952 env[1187]: time="2025-05-17T00:43:09.792909708Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:09.793555 env[1187]: time="2025-05-17T00:43:09.793520970Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:43:09.795810 env[1187]: time="2025-05-17T00:43:09.795779804Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\"" May 17 00:43:09.799099 env[1187]: time="2025-05-17T00:43:09.799057566Z" level=info msg="CreateContainer within sandbox \"d14bef72677ecc390e0e493b8de09e48ed0dad04f5c5d970fbea4aec0b674831\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:43:09.815823 env[1187]: time="2025-05-17T00:43:09.815521293Z" level=info msg="CreateContainer within sandbox \"d14bef72677ecc390e0e493b8de09e48ed0dad04f5c5d970fbea4aec0b674831\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"eaaf6674e63d235d7379fd107971667537f1a07510d6d8a6606450a7a4b1449a\"" May 17 00:43:09.816565 env[1187]: time="2025-05-17T00:43:09.816515338Z" level=info msg="StartContainer for \"eaaf6674e63d235d7379fd107971667537f1a07510d6d8a6606450a7a4b1449a\"" May 17 00:43:09.849130 systemd[1]: Started cri-containerd-eaaf6674e63d235d7379fd107971667537f1a07510d6d8a6606450a7a4b1449a.scope. May 17 00:43:09.871000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876457 kernel: kauditd_printk_skb: 333 callbacks suppressed May 17 00:43:09.876753 kernel: audit: type=1400 audit(1747442589.871:473): avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.871000 audit[1585]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe489f1a518 items=0 ppid=1511 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:09.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561616636363734653633643233356437333739666431303739373136 May 17 00:43:09.885099 kernel: audit: type=1300 audit(1747442589.871:473): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe489f1a518 items=0 ppid=1511 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:09.885260 kernel: audit: type=1327 audit(1747442589.871:473): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561616636363734653633643233356437333739666431303739373136 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.888768 kernel: audit: type=1400 audit(1747442589.876:474): avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.894793 kernel: audit: type=1400 audit(1747442589.876:474): avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.894942 kernel: audit: type=1400 audit(1747442589.876:474): avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.895004 kernel: audit: type=1400 audit(1747442589.876:474): avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.900062 kernel: audit: type=1400 audit(1747442589.876:474): avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.902591 kernel: audit: type=1400 audit(1747442589.876:474): avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.902951 kernel: audit: type=1400 audit(1747442589.876:474): avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit: BPF prog-id=69 op=LOAD May 17 00:43:09.876000 audit[1585]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003b4038 items=0 ppid=1511 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:09.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561616636363734653633643233356437333739666431303739373136 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit: BPF prog-id=70 op=LOAD May 17 00:43:09.876000 audit[1585]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003b4088 items=0 ppid=1511 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:09.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561616636363734653633643233356437333739666431303739373136 May 17 00:43:09.876000 audit: BPF prog-id=70 op=UNLOAD May 17 00:43:09.876000 audit: BPF prog-id=69 op=UNLOAD May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { perfmon } for pid=1585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit[1585]: AVC avc: denied { bpf } for pid=1585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:09.876000 audit: BPF prog-id=71 op=LOAD May 17 00:43:09.876000 audit[1585]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003b4118 items=0 ppid=1511 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:09.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561616636363734653633643233356437333739666431303739373136 May 17 00:43:09.914914 env[1187]: time="2025-05-17T00:43:09.914798181Z" level=info msg="StartContainer for \"eaaf6674e63d235d7379fd107971667537f1a07510d6d8a6606450a7a4b1449a\" returns successfully" May 17 00:43:09.923663 systemd[1]: cri-containerd-eaaf6674e63d235d7379fd107971667537f1a07510d6d8a6606450a7a4b1449a.scope: Deactivated successfully. May 17 00:43:09.925000 audit: BPF prog-id=71 op=UNLOAD May 17 00:43:09.964876 env[1187]: time="2025-05-17T00:43:09.964795356Z" level=info msg="shim disconnected" id=eaaf6674e63d235d7379fd107971667537f1a07510d6d8a6606450a7a4b1449a May 17 00:43:09.964876 env[1187]: time="2025-05-17T00:43:09.964871021Z" level=warning msg="cleaning up after shim disconnected" id=eaaf6674e63d235d7379fd107971667537f1a07510d6d8a6606450a7a4b1449a namespace=k8s.io May 17 00:43:09.964876 env[1187]: time="2025-05-17T00:43:09.964886148Z" level=info msg="cleaning up dead shim" May 17 00:43:09.976969 env[1187]: time="2025-05-17T00:43:09.976915118Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:43:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1624 runtime=io.containerd.runc.v2\n" May 17 00:43:10.466538 kubelet[1436]: E0517 00:43:10.466461 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:10.619911 systemd[1]: run-containerd-runc-k8s.io-eaaf6674e63d235d7379fd107971667537f1a07510d6d8a6606450a7a4b1449a-runc.n8nInt.mount: Deactivated successfully. May 17 00:43:10.620028 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-eaaf6674e63d235d7379fd107971667537f1a07510d6d8a6606450a7a4b1449a-rootfs.mount: Deactivated successfully. May 17 00:43:10.906514 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2538808923.mount: Deactivated successfully. May 17 00:43:11.467277 kubelet[1436]: E0517 00:43:11.467183 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:11.663500 kubelet[1436]: E0517 00:43:11.663435 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6lqkv" podUID="1a3ba9f2-6638-45de-97a2-7ec41db800d6" May 17 00:43:11.789445 env[1187]: time="2025-05-17T00:43:11.789004836Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:11.791188 env[1187]: time="2025-05-17T00:43:11.791123183Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:11.792836 env[1187]: time="2025-05-17T00:43:11.792780377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:11.794483 env[1187]: time="2025-05-17T00:43:11.794439169Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:7ddf379897139ae8ade8b33cb9373b70c632a4d5491da6e234f5d830e0a50807,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:11.795216 env[1187]: time="2025-05-17T00:43:11.795176960Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\" returns image reference \"sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2\"" May 17 00:43:11.798376 env[1187]: time="2025-05-17T00:43:11.798218950Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:43:11.801436 env[1187]: time="2025-05-17T00:43:11.801367929Z" level=info msg="CreateContainer within sandbox \"785f78504cbd30c8acf6335d4cd157fa58d6e4949ae97979f096775785d37c92\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:43:11.813048 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2445023708.mount: Deactivated successfully. May 17 00:43:11.821357 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2005258141.mount: Deactivated successfully. May 17 00:43:11.825212 env[1187]: time="2025-05-17T00:43:11.825131582Z" level=info msg="CreateContainer within sandbox \"785f78504cbd30c8acf6335d4cd157fa58d6e4949ae97979f096775785d37c92\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"934a19bbb8f6ba8e56fba6da021136a8a1674b6fa5c208f6f9f16618e1ab282e\"" May 17 00:43:11.826182 env[1187]: time="2025-05-17T00:43:11.826105553Z" level=info msg="StartContainer for \"934a19bbb8f6ba8e56fba6da021136a8a1674b6fa5c208f6f9f16618e1ab282e\"" May 17 00:43:11.868040 systemd[1]: Started cri-containerd-934a19bbb8f6ba8e56fba6da021136a8a1674b6fa5c208f6f9f16618e1ab282e.scope. May 17 00:43:11.898000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.898000 audit[1651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f456c910778 items=0 ppid=1509 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:11.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933346131396262623866366261386535366662613664613032313133 May 17 00:43:11.899000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.899000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.899000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.899000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.899000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.899000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.899000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.899000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.899000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.899000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.899000 audit: BPF prog-id=72 op=LOAD May 17 00:43:11.899000 audit[1651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003e8348 items=0 ppid=1509 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:11.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933346131396262623866366261386535366662613664613032313133 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit: BPF prog-id=73 op=LOAD May 17 00:43:11.900000 audit[1651]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003e8398 items=0 ppid=1509 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:11.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933346131396262623866366261386535366662613664613032313133 May 17 00:43:11.900000 audit: BPF prog-id=73 op=UNLOAD May 17 00:43:11.900000 audit: BPF prog-id=72 op=UNLOAD May 17 00:43:11.900000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:11.900000 audit: BPF prog-id=74 op=LOAD May 17 00:43:11.900000 audit[1651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e8428 items=0 ppid=1509 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:11.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933346131396262623866366261386535366662613664613032313133 May 17 00:43:11.932273 env[1187]: time="2025-05-17T00:43:11.932196090Z" level=info msg="StartContainer for \"934a19bbb8f6ba8e56fba6da021136a8a1674b6fa5c208f6f9f16618e1ab282e\" returns successfully" May 17 00:43:12.099000 audit[1714]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.099000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff956f8b10 a2=0 a3=7fff956f8afc items=0 ppid=1662 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:43:12.101000 audit[1716]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.101000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe673cd9a0 a2=0 a3=7ffe673cd98c items=0 ppid=1662 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.101000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:43:12.104000 audit[1717]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.104000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca5fc1ed0 a2=0 a3=7ffca5fc1ebc items=0 ppid=1662 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:43:12.110000 audit[1719]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.110000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc31d5e3a0 a2=0 a3=7ffc31d5e38c items=0 ppid=1662 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.110000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:43:12.112000 audit[1720]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.112000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1d2c8630 a2=0 a3=7ffe1d2c861c items=0 ppid=1662 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.112000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:43:12.114000 audit[1721]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.114000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe41679410 a2=0 a3=7ffe416793fc items=0 ppid=1662 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:43:12.208000 audit[1722]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.208000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffe9633080 a2=0 a3=7fffe963306c items=0 ppid=1662 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:43:12.213000 audit[1724]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.213000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc8c462ed0 a2=0 a3=7ffc8c462ebc items=0 ppid=1662 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.213000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:43:12.219000 audit[1727]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.219000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffce4511f20 a2=0 a3=7ffce4511f0c items=0 ppid=1662 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:43:12.221000 audit[1728]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.221000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe47962b80 a2=0 a3=7ffe47962b6c items=0 ppid=1662 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:43:12.225000 audit[1730]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.225000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd502c1ac0 a2=0 a3=7ffd502c1aac items=0 ppid=1662 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:43:12.229000 audit[1731]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.229000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0075fc30 a2=0 a3=7ffc0075fc1c items=0 ppid=1662 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:43:12.237000 audit[1733]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.237000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeed7c6e00 a2=0 a3=7ffeed7c6dec items=0 ppid=1662 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:43:12.244000 audit[1736]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.244000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd1ca82320 a2=0 a3=7ffd1ca8230c items=0 ppid=1662 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:43:12.246000 audit[1737]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.246000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6582c050 a2=0 a3=7fff6582c03c items=0 ppid=1662 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.246000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:43:12.250000 audit[1739]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.250000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd5214cac0 a2=0 a3=7ffd5214caac items=0 ppid=1662 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.250000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:43:12.252000 audit[1740]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.252000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd33e68970 a2=0 a3=7ffd33e6895c items=0 ppid=1662 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:43:12.257000 audit[1742]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.257000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff854a8a20 a2=0 a3=7fff854a8a0c items=0 ppid=1662 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:43:12.262000 audit[1745]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.262000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffad709120 a2=0 a3=7fffad70910c items=0 ppid=1662 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:43:12.267000 audit[1748]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.267000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6aa85a40 a2=0 a3=7ffc6aa85a2c items=0 ppid=1662 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:43:12.269000 audit[1749]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.269000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcbb5101a0 a2=0 a3=7ffcbb51018c items=0 ppid=1662 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:43:12.274000 audit[1751]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.274000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd171d9050 a2=0 a3=7ffd171d903c items=0 ppid=1662 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:43:12.308000 audit[1755]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.308000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffb1c6ab50 a2=0 a3=7fffb1c6ab3c items=0 ppid=1662 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.308000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:43:12.311000 audit[1756]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.311000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffab6ddc70 a2=0 a3=7fffab6ddc5c items=0 ppid=1662 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:43:12.316000 audit[1758]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:43:12.316000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcbb568840 a2=0 a3=7ffcbb56882c items=0 ppid=1662 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.316000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:43:12.355000 audit[1764]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:12.355000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe0b092750 a2=0 a3=7ffe0b09273c items=0 ppid=1662 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:12.391000 audit[1764]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:12.391000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffe0b092750 a2=0 a3=7ffe0b09273c items=0 ppid=1662 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:12.408000 audit[1773]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.408000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe40725530 a2=0 a3=7ffe4072551c items=0 ppid=1662 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:43:12.412000 audit[1775]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.412000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeb2037b90 a2=0 a3=7ffeb2037b7c items=0 ppid=1662 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:43:12.420000 audit[1778]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.420000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffec3c504a0 a2=0 a3=7ffec3c5048c items=0 ppid=1662 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:43:12.422000 audit[1779]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.422000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2008b600 a2=0 a3=7ffe2008b5ec items=0 ppid=1662 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:43:12.425000 audit[1781]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.425000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe28d32b70 a2=0 a3=7ffe28d32b5c items=0 ppid=1662 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:43:12.427000 audit[1782]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.427000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff10bfe410 a2=0 a3=7fff10bfe3fc items=0 ppid=1662 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:43:12.432000 audit[1784]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.432000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffd8195b30 a2=0 a3=7fffd8195b1c items=0 ppid=1662 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:43:12.439000 audit[1787]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.439000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdad2cf460 a2=0 a3=7ffdad2cf44c items=0 ppid=1662 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:43:12.441000 audit[1788]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.441000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc427b9d40 a2=0 a3=7ffc427b9d2c items=0 ppid=1662 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:43:12.445000 audit[1790]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.445000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd6ca252f0 a2=0 a3=7ffd6ca252dc items=0 ppid=1662 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:43:12.447000 audit[1791]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.447000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff590ec6c0 a2=0 a3=7fff590ec6ac items=0 ppid=1662 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:43:12.451000 audit[1793]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.451000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd199f97e0 a2=0 a3=7ffd199f97cc items=0 ppid=1662 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:43:12.455000 audit[1796]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.455000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3e6a0c30 a2=0 a3=7ffc3e6a0c1c items=0 ppid=1662 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:43:12.460000 audit[1799]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.460000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc17266980 a2=0 a3=7ffc1726696c items=0 ppid=1662 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:43:12.462000 audit[1800]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.462000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf0cdcc30 a2=0 a3=7ffdf0cdcc1c items=0 ppid=1662 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.462000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:43:12.467542 kubelet[1436]: E0517 00:43:12.467433 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:12.466000 audit[1802]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.466000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe0cd98c00 a2=0 a3=7ffe0cd98bec items=0 ppid=1662 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:43:12.472000 audit[1805]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.472000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffd9a4a140 a2=0 a3=7fffd9a4a12c items=0 ppid=1662 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:43:12.475000 audit[1806]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.475000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea8326f20 a2=0 a3=7ffea8326f0c items=0 ppid=1662 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.475000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:43:12.479000 audit[1808]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.479000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff203079c0 a2=0 a3=7fff203079ac items=0 ppid=1662 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.479000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:43:12.481000 audit[1809]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.481000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe150d86c0 a2=0 a3=7ffe150d86ac items=0 ppid=1662 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.481000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:43:12.485000 audit[1811]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.485000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd67ad29e0 a2=0 a3=7ffd67ad29cc items=0 ppid=1662 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.485000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:43:12.491000 audit[1814]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:43:12.491000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe19c46da0 a2=0 a3=7ffe19c46d8c items=0 ppid=1662 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:43:12.495000 audit[1816]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:43:12.495000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff3703bea0 a2=0 a3=7fff3703be8c items=0 ppid=1662 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.495000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:12.496000 audit[1816]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:43:12.496000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff3703bea0 a2=0 a3=7fff3703be8c items=0 ppid=1662 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:12.496000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:12.692068 kubelet[1436]: E0517 00:43:12.692030 1436 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:13.468548 kubelet[1436]: E0517 00:43:13.468462 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:13.664169 kubelet[1436]: E0517 00:43:13.664090 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6lqkv" podUID="1a3ba9f2-6638-45de-97a2-7ec41db800d6" May 17 00:43:13.693839 kubelet[1436]: E0517 00:43:13.693372 1436 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" May 17 00:43:14.468679 kubelet[1436]: E0517 00:43:14.468595 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:15.469963 kubelet[1436]: E0517 00:43:15.469854 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:15.589483 env[1187]: time="2025-05-17T00:43:15.589420701Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:15.592688 env[1187]: time="2025-05-17T00:43:15.592387311Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:15.594681 env[1187]: time="2025-05-17T00:43:15.594598939Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:15.601056 env[1187]: time="2025-05-17T00:43:15.600984553Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:15.601628 env[1187]: time="2025-05-17T00:43:15.601590826Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:43:15.606491 env[1187]: time="2025-05-17T00:43:15.606406805Z" level=info msg="CreateContainer within sandbox \"d14bef72677ecc390e0e493b8de09e48ed0dad04f5c5d970fbea4aec0b674831\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:43:15.622167 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount803615418.mount: Deactivated successfully. May 17 00:43:15.627962 env[1187]: time="2025-05-17T00:43:15.627806674Z" level=info msg="CreateContainer within sandbox \"d14bef72677ecc390e0e493b8de09e48ed0dad04f5c5d970fbea4aec0b674831\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"10f35c464626a65c0b1bf0836e426afd5865e243b23bcfd3eb98f5722dba3e3f\"" May 17 00:43:15.629360 env[1187]: time="2025-05-17T00:43:15.629289248Z" level=info msg="StartContainer for \"10f35c464626a65c0b1bf0836e426afd5865e243b23bcfd3eb98f5722dba3e3f\"" May 17 00:43:15.662810 kubelet[1436]: E0517 00:43:15.662302 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6lqkv" podUID="1a3ba9f2-6638-45de-97a2-7ec41db800d6" May 17 00:43:15.664682 systemd[1]: Started cri-containerd-10f35c464626a65c0b1bf0836e426afd5865e243b23bcfd3eb98f5722dba3e3f.scope. May 17 00:43:15.710957 kernel: kauditd_printk_skb: 230 callbacks suppressed May 17 00:43:15.711190 kernel: audit: type=1400 audit(1747442595.705:537): avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.705000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.705000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdc1071e718 items=0 ppid=1511 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:15.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130663335633436343632366136356330623162663038333665343236 May 17 00:43:15.720487 kernel: audit: type=1300 audit(1747442595.705:537): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdc1071e718 items=0 ppid=1511 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:15.720751 kernel: audit: type=1327 audit(1747442595.705:537): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130663335633436343632366136356330623162663038333665343236 May 17 00:43:15.720823 kernel: audit: type=1400 audit(1747442595.713:538): avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.713000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.713000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.713000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.731286 kernel: audit: type=1400 audit(1747442595.713:538): avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.731514 kernel: audit: type=1400 audit(1747442595.713:538): avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.713000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.713000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.737687 kernel: audit: type=1400 audit(1747442595.713:538): avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.737884 kernel: audit: type=1400 audit(1747442595.713:538): avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.737953 kernel: audit: type=1400 audit(1747442595.713:538): avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.713000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.740190 kernel: audit: type=1400 audit(1747442595.713:538): avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.713000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.713000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.713000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.713000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.713000 audit: BPF prog-id=75 op=LOAD May 17 00:43:15.713000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00022c7e8 items=0 ppid=1511 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:15.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130663335633436343632366136356330623162663038333665343236 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit: BPF prog-id=76 op=LOAD May 17 00:43:15.714000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00022c838 items=0 ppid=1511 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:15.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130663335633436343632366136356330623162663038333665343236 May 17 00:43:15.714000 audit: BPF prog-id=76 op=UNLOAD May 17 00:43:15.714000 audit: BPF prog-id=75 op=UNLOAD May 17 00:43:15.714000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:15.714000 audit: BPF prog-id=77 op=LOAD May 17 00:43:15.714000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00022c8c8 items=0 ppid=1511 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:15.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130663335633436343632366136356330623162663038333665343236 May 17 00:43:15.750321 env[1187]: time="2025-05-17T00:43:15.750243572Z" level=info msg="StartContainer for \"10f35c464626a65c0b1bf0836e426afd5865e243b23bcfd3eb98f5722dba3e3f\" returns successfully" May 17 00:43:16.227000 audit[1853]: NETFILTER_CFG table=filter:65 family=2 entries=13 op=nft_register_rule pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:16.227000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff1a3b2180 a2=0 a3=7fff1a3b216c items=0 ppid=1662 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:16.227000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:16.233000 audit[1853]: NETFILTER_CFG table=nat:66 family=2 entries=27 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:16.233000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff1a3b2180 a2=0 a3=7fff1a3b216c items=0 ppid=1662 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:16.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:16.470069 kubelet[1436]: E0517 00:43:16.469980 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:16.587592 env[1187]: time="2025-05-17T00:43:16.587382936Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:43:16.591735 systemd[1]: cri-containerd-10f35c464626a65c0b1bf0836e426afd5865e243b23bcfd3eb98f5722dba3e3f.scope: Deactivated successfully. May 17 00:43:16.595000 audit: BPF prog-id=77 op=UNLOAD May 17 00:43:16.622251 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-10f35c464626a65c0b1bf0836e426afd5865e243b23bcfd3eb98f5722dba3e3f-rootfs.mount: Deactivated successfully. May 17 00:43:16.676387 kubelet[1436]: I0517 00:43:16.676320 1436 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:43:16.679555 env[1187]: time="2025-05-17T00:43:16.679495089Z" level=info msg="shim disconnected" id=10f35c464626a65c0b1bf0836e426afd5865e243b23bcfd3eb98f5722dba3e3f May 17 00:43:16.680181 env[1187]: time="2025-05-17T00:43:16.680143237Z" level=warning msg="cleaning up after shim disconnected" id=10f35c464626a65c0b1bf0836e426afd5865e243b23bcfd3eb98f5722dba3e3f namespace=k8s.io May 17 00:43:16.680323 env[1187]: time="2025-05-17T00:43:16.680299965Z" level=info msg="cleaning up dead shim" May 17 00:43:16.692633 env[1187]: time="2025-05-17T00:43:16.692534210Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:43:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1867 runtime=io.containerd.runc.v2\n" May 17 00:43:16.705313 env[1187]: time="2025-05-17T00:43:16.705254549Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:43:16.729848 kubelet[1436]: I0517 00:43:16.729728 1436 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-v9k62" podStartSLOduration=8.375921236 podStartE2EDuration="11.729707403s" podCreationTimestamp="2025-05-17 00:43:05 +0000 UTC" firstStartedPulling="2025-05-17 00:43:08.443065346 +0000 UTC m=+3.431216504" lastFinishedPulling="2025-05-17 00:43:11.796851496 +0000 UTC m=+6.785002671" observedRunningTime="2025-05-17 00:43:12.757363156 +0000 UTC m=+7.745514346" watchObservedRunningTime="2025-05-17 00:43:16.729707403 +0000 UTC m=+11.717858579" May 17 00:43:17.470909 kubelet[1436]: E0517 00:43:17.470835 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:17.669306 systemd[1]: Created slice kubepods-besteffort-pod1a3ba9f2_6638_45de_97a2_7ec41db800d6.slice. May 17 00:43:17.672421 env[1187]: time="2025-05-17T00:43:17.672340580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6lqkv,Uid:1a3ba9f2-6638-45de-97a2-7ec41db800d6,Namespace:calico-system,Attempt:0,}" May 17 00:43:17.776848 env[1187]: time="2025-05-17T00:43:17.773589486Z" level=error msg="Failed to destroy network for sandbox \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:17.775926 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd-shm.mount: Deactivated successfully. May 17 00:43:17.777703 env[1187]: time="2025-05-17T00:43:17.777611506Z" level=error msg="encountered an error cleaning up failed sandbox \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:17.777812 env[1187]: time="2025-05-17T00:43:17.777730520Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6lqkv,Uid:1a3ba9f2-6638-45de-97a2-7ec41db800d6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:17.778077 kubelet[1436]: E0517 00:43:17.778010 1436 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:17.778189 kubelet[1436]: E0517 00:43:17.778117 1436 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6lqkv" May 17 00:43:17.778189 kubelet[1436]: E0517 00:43:17.778157 1436 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6lqkv" May 17 00:43:17.778293 kubelet[1436]: E0517 00:43:17.778233 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6lqkv_calico-system(1a3ba9f2-6638-45de-97a2-7ec41db800d6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6lqkv_calico-system(1a3ba9f2-6638-45de-97a2-7ec41db800d6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6lqkv" podUID="1a3ba9f2-6638-45de-97a2-7ec41db800d6" May 17 00:43:18.471667 kubelet[1436]: E0517 00:43:18.471587 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:18.714496 kubelet[1436]: I0517 00:43:18.714439 1436 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:43:18.715895 env[1187]: time="2025-05-17T00:43:18.715829596Z" level=info msg="StopPodSandbox for \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\"" May 17 00:43:18.789629 env[1187]: time="2025-05-17T00:43:18.789195050Z" level=error msg="StopPodSandbox for \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\" failed" error="failed to destroy network for sandbox \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:18.790758 kubelet[1436]: E0517 00:43:18.790587 1436 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:43:18.791012 kubelet[1436]: E0517 00:43:18.790721 1436 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd"} May 17 00:43:18.791012 kubelet[1436]: E0517 00:43:18.790854 1436 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1a3ba9f2-6638-45de-97a2-7ec41db800d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:43:18.791012 kubelet[1436]: E0517 00:43:18.790895 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1a3ba9f2-6638-45de-97a2-7ec41db800d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6lqkv" podUID="1a3ba9f2-6638-45de-97a2-7ec41db800d6" May 17 00:43:19.472583 kubelet[1436]: E0517 00:43:19.472527 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:20.473352 kubelet[1436]: E0517 00:43:20.473269 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:20.929935 systemd[1]: Created slice kubepods-besteffort-pod14a29283_7c6b_4438_8f1e_095af8425f2a.slice. May 17 00:43:20.938432 kubelet[1436]: I0517 00:43:20.938362 1436 status_manager.go:895] "Failed to get status for pod" podUID="14a29283-7c6b-4438-8f1e-095af8425f2a" pod="default/nginx-deployment-7fcdb87857-ggprp" err="pods \"nginx-deployment-7fcdb87857-ggprp\" is forbidden: User \"system:node:137.184.33.91\" cannot get resource \"pods\" in API group \"\" in the namespace \"default\": no relationship found between node '137.184.33.91' and this object" May 17 00:43:20.938638 kubelet[1436]: E0517 00:43:20.938485 1436 reflector.go:200] "Failed to watch" err="failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:137.184.33.91\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"default\": no relationship found between node '137.184.33.91' and this object" logger="UnhandledError" reflector="object-\"default\"/\"kube-root-ca.crt\"" type="*v1.ConfigMap" May 17 00:43:20.999964 kubelet[1436]: I0517 00:43:20.999852 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-frm7s\" (UniqueName: \"kubernetes.io/projected/14a29283-7c6b-4438-8f1e-095af8425f2a-kube-api-access-frm7s\") pod \"nginx-deployment-7fcdb87857-ggprp\" (UID: \"14a29283-7c6b-4438-8f1e-095af8425f2a\") " pod="default/nginx-deployment-7fcdb87857-ggprp" May 17 00:43:21.474360 kubelet[1436]: E0517 00:43:21.474274 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:22.110687 kubelet[1436]: E0517 00:43:22.110280 1436 projected.go:289] Couldn't get configMap default/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 17 00:43:22.110687 kubelet[1436]: E0517 00:43:22.110343 1436 projected.go:194] Error preparing data for projected volume kube-api-access-frm7s for pod default/nginx-deployment-7fcdb87857-ggprp: failed to sync configmap cache: timed out waiting for the condition May 17 00:43:22.110687 kubelet[1436]: E0517 00:43:22.110447 1436 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/14a29283-7c6b-4438-8f1e-095af8425f2a-kube-api-access-frm7s podName:14a29283-7c6b-4438-8f1e-095af8425f2a nodeName:}" failed. No retries permitted until 2025-05-17 00:43:22.610422077 +0000 UTC m=+17.598573247 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-frm7s" (UniqueName: "kubernetes.io/projected/14a29283-7c6b-4438-8f1e-095af8425f2a-kube-api-access-frm7s") pod "nginx-deployment-7fcdb87857-ggprp" (UID: "14a29283-7c6b-4438-8f1e-095af8425f2a") : failed to sync configmap cache: timed out waiting for the condition May 17 00:43:22.474929 kubelet[1436]: E0517 00:43:22.474851 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:22.740935 env[1187]: time="2025-05-17T00:43:22.740520153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-ggprp,Uid:14a29283-7c6b-4438-8f1e-095af8425f2a,Namespace:default,Attempt:0,}" May 17 00:43:22.855675 env[1187]: time="2025-05-17T00:43:22.855571352Z" level=error msg="Failed to destroy network for sandbox \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:22.858523 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83-shm.mount: Deactivated successfully. May 17 00:43:22.860804 env[1187]: time="2025-05-17T00:43:22.860721218Z" level=error msg="encountered an error cleaning up failed sandbox \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:22.860954 env[1187]: time="2025-05-17T00:43:22.860831200Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-ggprp,Uid:14a29283-7c6b-4438-8f1e-095af8425f2a,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:22.861227 kubelet[1436]: E0517 00:43:22.861179 1436 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:22.861303 kubelet[1436]: E0517 00:43:22.861276 1436 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-ggprp" May 17 00:43:22.861353 kubelet[1436]: E0517 00:43:22.861326 1436 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-ggprp" May 17 00:43:22.861458 kubelet[1436]: E0517 00:43:22.861426 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-ggprp_default(14a29283-7c6b-4438-8f1e-095af8425f2a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-ggprp_default(14a29283-7c6b-4438-8f1e-095af8425f2a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-ggprp" podUID="14a29283-7c6b-4438-8f1e-095af8425f2a" May 17 00:43:23.475409 kubelet[1436]: E0517 00:43:23.475332 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:23.734707 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3703036132.mount: Deactivated successfully. May 17 00:43:23.761730 env[1187]: time="2025-05-17T00:43:23.761617101Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:23.763775 env[1187]: time="2025-05-17T00:43:23.763711731Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:23.765495 env[1187]: time="2025-05-17T00:43:23.765444121Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:23.766924 env[1187]: time="2025-05-17T00:43:23.766883112Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:23.767575 env[1187]: time="2025-05-17T00:43:23.767542638Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:43:23.790150 kubelet[1436]: I0517 00:43:23.790118 1436 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:43:23.790343 env[1187]: time="2025-05-17T00:43:23.790308471Z" level=info msg="CreateContainer within sandbox \"d14bef72677ecc390e0e493b8de09e48ed0dad04f5c5d970fbea4aec0b674831\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:43:23.791512 env[1187]: time="2025-05-17T00:43:23.791458892Z" level=info msg="StopPodSandbox for \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\"" May 17 00:43:23.806178 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3651165795.mount: Deactivated successfully. May 17 00:43:23.809831 env[1187]: time="2025-05-17T00:43:23.809767227Z" level=info msg="CreateContainer within sandbox \"d14bef72677ecc390e0e493b8de09e48ed0dad04f5c5d970fbea4aec0b674831\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b333d645e1a58f9038bce255523da3f6c792886fe116ee7e301270149623f880\"" May 17 00:43:23.810930 env[1187]: time="2025-05-17T00:43:23.810879162Z" level=info msg="StartContainer for \"b333d645e1a58f9038bce255523da3f6c792886fe116ee7e301270149623f880\"" May 17 00:43:23.850014 systemd[1]: Started cri-containerd-b333d645e1a58f9038bce255523da3f6c792886fe116ee7e301270149623f880.scope. May 17 00:43:23.857905 env[1187]: time="2025-05-17T00:43:23.855534516Z" level=error msg="StopPodSandbox for \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\" failed" error="failed to destroy network for sandbox \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:43:23.858110 kubelet[1436]: E0517 00:43:23.855823 1436 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:43:23.858110 kubelet[1436]: E0517 00:43:23.855875 1436 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83"} May 17 00:43:23.858110 kubelet[1436]: E0517 00:43:23.855930 1436 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"14a29283-7c6b-4438-8f1e-095af8425f2a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:43:23.858110 kubelet[1436]: E0517 00:43:23.855964 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"14a29283-7c6b-4438-8f1e-095af8425f2a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-ggprp" podUID="14a29283-7c6b-4438-8f1e-095af8425f2a" May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.878934 kernel: kauditd_printk_skb: 40 callbacks suppressed May 17 00:43:23.878995 kernel: audit: type=1400 audit(1747442603.877:546): avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f41ced003e8 items=0 ppid=1511 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:23.885742 kernel: audit: type=1300 audit(1747442603.877:546): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f41ced003e8 items=0 ppid=1511 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:23.885907 kernel: audit: type=1327 audit(1747442603.877:546): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333364363435653161353866393033386263653235353532336461 May 17 00:43:23.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333364363435653161353866393033386263653235353532336461 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.895803 kernel: audit: type=1400 audit(1747442603.877:547): avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.895926 kernel: audit: type=1400 audit(1747442603.877:547): avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.898683 kernel: audit: type=1400 audit(1747442603.877:547): avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.901683 kernel: audit: type=1400 audit(1747442603.877:547): avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.910385 kernel: audit: type=1400 audit(1747442603.877:547): avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.910500 kernel: audit: type=1400 audit(1747442603.877:547): avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.910524 kernel: audit: type=1400 audit(1747442603.877:547): avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit: BPF prog-id=78 op=LOAD May 17 00:43:23.877000 audit[1980]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00028a3b8 items=0 ppid=1511 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:23.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333364363435653161353866393033386263653235353532336461 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit: BPF prog-id=79 op=LOAD May 17 00:43:23.877000 audit[1980]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00028a408 items=0 ppid=1511 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:23.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333364363435653161353866393033386263653235353532336461 May 17 00:43:23.877000 audit: BPF prog-id=79 op=UNLOAD May 17 00:43:23.877000 audit: BPF prog-id=78 op=UNLOAD May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { perfmon } for pid=1980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit[1980]: AVC avc: denied { bpf } for pid=1980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:23.877000 audit: BPF prog-id=80 op=LOAD May 17 00:43:23.877000 audit[1980]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00028a498 items=0 ppid=1511 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:23.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233333364363435653161353866393033386263653235353532336461 May 17 00:43:23.927207 env[1187]: time="2025-05-17T00:43:23.927159377Z" level=info msg="StartContainer for \"b333d645e1a58f9038bce255523da3f6c792886fe116ee7e301270149623f880\" returns successfully" May 17 00:43:24.050117 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:43:24.050307 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:43:24.476607 kubelet[1436]: E0517 00:43:24.476545 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:24.826569 systemd[1]: run-containerd-runc-k8s.io-b333d645e1a58f9038bce255523da3f6c792886fe116ee7e301270149623f880-runc.NGTQWK.mount: Deactivated successfully. May 17 00:43:25.460919 kubelet[1436]: E0517 00:43:25.460860 1436 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:25.476779 kubelet[1436]: E0517 00:43:25.476700 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:25.590000 audit[2105]: AVC avc: denied { write } for pid=2105 comm="tee" name="fd" dev="proc" ino=20508 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:43:25.590000 audit[2105]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea6ddf7d0 a2=241 a3=1b6 items=1 ppid=2077 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:25.590000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:43:25.590000 audit: PATH item=0 name="/dev/fd/63" inode=20500 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:43:25.590000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:43:25.600000 audit[2101]: AVC avc: denied { write } for pid=2101 comm="tee" name="fd" dev="proc" ino=19659 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:43:25.600000 audit[2101]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdfafd47cf a2=241 a3=1b6 items=1 ppid=2078 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:25.600000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:43:25.600000 audit: PATH item=0 name="/dev/fd/63" inode=20497 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:43:25.600000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:43:25.609000 audit[2116]: AVC avc: denied { write } for pid=2116 comm="tee" name="fd" dev="proc" ino=20514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:43:25.609000 audit[2116]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce0bc77bf a2=241 a3=1b6 items=1 ppid=2076 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:25.609000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:43:25.609000 audit: PATH item=0 name="/dev/fd/63" inode=20511 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:43:25.609000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:43:25.611000 audit[2114]: AVC avc: denied { write } for pid=2114 comm="tee" name="fd" dev="proc" ino=20518 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:43:25.611000 audit[2114]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea3ccd7cf a2=241 a3=1b6 items=1 ppid=2074 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:25.611000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:43:25.611000 audit: PATH item=0 name="/dev/fd/63" inode=20510 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:43:25.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:43:25.624000 audit[2109]: AVC avc: denied { write } for pid=2109 comm="tee" name="fd" dev="proc" ino=19667 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:43:25.624000 audit[2109]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee574a7d1 a2=241 a3=1b6 items=1 ppid=2069 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:25.624000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:43:25.624000 audit: PATH item=0 name="/dev/fd/63" inode=19651 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:43:25.624000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:43:25.631000 audit[2112]: AVC avc: denied { write } for pid=2112 comm="tee" name="fd" dev="proc" ino=19669 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:43:25.631000 audit[2112]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd546a57c0 a2=241 a3=1b6 items=1 ppid=2073 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:25.631000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:43:25.631000 audit: PATH item=0 name="/dev/fd/63" inode=19654 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:43:25.631000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:43:25.663000 audit[2138]: AVC avc: denied { write } for pid=2138 comm="tee" name="fd" dev="proc" ino=20523 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:43:25.663000 audit[2138]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe48bf27cf a2=241 a3=1b6 items=1 ppid=2084 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:25.663000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:43:25.663000 audit: PATH item=0 name="/dev/fd/63" inode=19675 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:43:25.663000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:43:25.844068 systemd[1]: run-containerd-runc-k8s.io-b333d645e1a58f9038bce255523da3f6c792886fe116ee7e301270149623f880-runc.Ovi3I7.mount: Deactivated successfully. May 17 00:43:26.111000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit: BPF prog-id=81 op=LOAD May 17 00:43:26.111000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff50172540 a2=98 a3=3 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.111000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.111000 audit: BPF prog-id=81 op=UNLOAD May 17 00:43:26.111000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.111000 audit: BPF prog-id=82 op=LOAD May 17 00:43:26.111000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff50172330 a2=94 a3=54428f items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.111000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.112000 audit: BPF prog-id=82 op=UNLOAD May 17 00:43:26.112000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.112000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.112000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.112000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.112000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.112000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.112000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.112000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.112000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.112000 audit: BPF prog-id=83 op=LOAD May 17 00:43:26.112000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff50172360 a2=94 a3=2 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.112000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.112000 audit: BPF prog-id=83 op=UNLOAD May 17 00:43:26.258000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.258000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.258000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.258000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.258000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.258000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.258000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.258000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.258000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.258000 audit: BPF prog-id=84 op=LOAD May 17 00:43:26.258000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff50172220 a2=94 a3=1 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.258000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.259000 audit: BPF prog-id=84 op=UNLOAD May 17 00:43:26.259000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.259000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff501722f0 a2=50 a3=7fff501723d0 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.259000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff50172230 a2=28 a3=0 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff50172260 a2=28 a3=0 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff50172170 a2=28 a3=0 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff50172280 a2=28 a3=0 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff50172260 a2=28 a3=0 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff50172250 a2=28 a3=0 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff50172280 a2=28 a3=0 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff50172260 a2=28 a3=0 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff50172280 a2=28 a3=0 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff50172250 a2=28 a3=0 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff501722c0 a2=28 a3=0 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff50172070 a2=50 a3=1 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.271000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit: BPF prog-id=85 op=LOAD May 17 00:43:26.271000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff50172070 a2=94 a3=5 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.271000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.271000 audit: BPF prog-id=85 op=UNLOAD May 17 00:43:26.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff50172120 a2=50 a3=1 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.271000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff50172240 a2=4 a3=38 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.271000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.271000 audit[2200]: AVC avc: denied { confidentiality } for pid=2200 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:43:26.271000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff50172290 a2=94 a3=6 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.271000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.272000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { confidentiality } for pid=2200 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:43:26.272000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff50171a40 a2=94 a3=88 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.272000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.272000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.272000 audit[2200]: AVC avc: denied { confidentiality } for pid=2200 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:43:26.272000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff50171a40 a2=94 a3=88 items=0 ppid=2080 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.272000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:43:26.284000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.284000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.284000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.284000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.284000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.284000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.284000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.284000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.284000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.284000 audit: BPF prog-id=86 op=LOAD May 17 00:43:26.284000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffddcb055f0 a2=98 a3=1999999999999999 items=0 ppid=2080 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.284000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:43:26.285000 audit: BPF prog-id=86 op=UNLOAD May 17 00:43:26.285000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.285000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.285000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.285000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.285000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.285000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.285000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.285000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.285000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.285000 audit: BPF prog-id=87 op=LOAD May 17 00:43:26.285000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffddcb054d0 a2=94 a3=ffff items=0 ppid=2080 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.285000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:43:26.286000 audit: BPF prog-id=87 op=UNLOAD May 17 00:43:26.286000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.286000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.286000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.286000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.286000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.286000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.286000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.286000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.286000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.286000 audit: BPF prog-id=88 op=LOAD May 17 00:43:26.286000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffddcb05510 a2=94 a3=7ffddcb056f0 items=0 ppid=2080 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.286000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:43:26.287000 audit: BPF prog-id=88 op=UNLOAD May 17 00:43:26.392152 systemd-networkd[998]: vxlan.calico: Link UP May 17 00:43:26.392162 systemd-networkd[998]: vxlan.calico: Gained carrier May 17 00:43:26.442000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.442000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.442000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.442000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.442000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.442000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.442000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.442000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.442000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.442000 audit: BPF prog-id=89 op=LOAD May 17 00:43:26.442000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff06d954b0 a2=98 a3=0 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit: BPF prog-id=89 op=UNLOAD May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit: BPF prog-id=90 op=LOAD May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff06d952c0 a2=94 a3=54428f items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit: BPF prog-id=90 op=UNLOAD May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit: BPF prog-id=91 op=LOAD May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff06d952f0 a2=94 a3=2 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit: BPF prog-id=91 op=UNLOAD May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff06d951c0 a2=28 a3=0 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff06d951f0 a2=28 a3=0 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff06d95100 a2=28 a3=0 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff06d95210 a2=28 a3=0 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff06d951f0 a2=28 a3=0 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff06d951e0 a2=28 a3=0 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff06d95210 a2=28 a3=0 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff06d951f0 a2=28 a3=0 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff06d95210 a2=28 a3=0 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff06d951e0 a2=28 a3=0 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff06d95250 a2=28 a3=0 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.444000 audit: BPF prog-id=92 op=LOAD May 17 00:43:26.444000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff06d950c0 a2=94 a3=0 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.444000 audit: BPF prog-id=92 op=UNLOAD May 17 00:43:26.445000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.445000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff06d950b0 a2=50 a3=2800 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.445000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.445000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.445000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff06d950b0 a2=50 a3=2800 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.445000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit: BPF prog-id=93 op=LOAD May 17 00:43:26.446000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff06d948d0 a2=94 a3=2 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.446000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.446000 audit: BPF prog-id=93 op=UNLOAD May 17 00:43:26.446000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.446000 audit: BPF prog-id=94 op=LOAD May 17 00:43:26.446000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff06d949d0 a2=94 a3=30 items=0 ppid=2080 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.446000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:43:26.452000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.452000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.452000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.452000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.452000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.452000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.452000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.452000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.452000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.452000 audit: BPF prog-id=95 op=LOAD May 17 00:43:26.452000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff82d32ad0 a2=98 a3=0 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.452000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.454000 audit: BPF prog-id=95 op=UNLOAD May 17 00:43:26.454000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit: BPF prog-id=96 op=LOAD May 17 00:43:26.454000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff82d328c0 a2=94 a3=54428f items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.454000 audit: BPF prog-id=96 op=UNLOAD May 17 00:43:26.454000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.454000 audit: BPF prog-id=97 op=LOAD May 17 00:43:26.454000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff82d328f0 a2=94 a3=2 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.454000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.454000 audit: BPF prog-id=97 op=UNLOAD May 17 00:43:26.477015 kubelet[1436]: E0517 00:43:26.476927 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:26.652000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.652000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.652000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.652000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.652000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.652000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.652000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.652000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.652000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.652000 audit: BPF prog-id=98 op=LOAD May 17 00:43:26.652000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff82d327b0 a2=94 a3=1 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.653000 audit: BPF prog-id=98 op=UNLOAD May 17 00:43:26.653000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.653000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff82d32880 a2=50 a3=7fff82d32960 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.653000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.668000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.668000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff82d327c0 a2=28 a3=0 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.668000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.669000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.669000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff82d327f0 a2=28 a3=0 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.669000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.669000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff82d32700 a2=28 a3=0 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.669000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.669000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff82d32810 a2=28 a3=0 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.670000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.670000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff82d327f0 a2=28 a3=0 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.670000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.670000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff82d327e0 a2=28 a3=0 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.670000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.670000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff82d32810 a2=28 a3=0 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.670000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.670000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff82d327f0 a2=28 a3=0 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.670000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.670000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff82d32810 a2=28 a3=0 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.671000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.671000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff82d327e0 a2=28 a3=0 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.671000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.671000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.671000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff82d32850 a2=28 a3=0 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.671000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.672000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.672000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff82d32600 a2=50 a3=1 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.672000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.672000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.672000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.672000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.672000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.672000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.672000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.672000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.672000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.672000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.672000 audit: BPF prog-id=99 op=LOAD May 17 00:43:26.672000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff82d32600 a2=94 a3=5 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.672000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.673000 audit: BPF prog-id=99 op=UNLOAD May 17 00:43:26.673000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.673000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff82d326b0 a2=50 a3=1 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.673000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.674000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.674000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff82d327d0 a2=4 a3=38 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.674000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.674000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.674000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.674000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.674000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.674000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.674000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.674000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.674000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.674000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.674000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.674000 audit[2232]: AVC avc: denied { confidentiality } for pid=2232 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:43:26.674000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff82d32820 a2=94 a3=6 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.674000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.675000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.675000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.675000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.675000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.675000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.675000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.675000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.675000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.675000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.675000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.675000 audit[2232]: AVC avc: denied { confidentiality } for pid=2232 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:43:26.675000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff82d31fd0 a2=94 a3=88 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.675000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.676000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.676000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.676000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.676000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.676000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.676000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.676000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.676000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.676000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.676000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.676000 audit[2232]: AVC avc: denied { confidentiality } for pid=2232 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:43:26.676000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff82d31fd0 a2=94 a3=88 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.676000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.678000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.678000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff82d33a00 a2=10 a3=f8f00800 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.678000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.679000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.679000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff82d338a0 a2=10 a3=3 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.679000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.679000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.679000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff82d33840 a2=10 a3=3 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.679000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.679000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:26.679000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff82d33840 a2=10 a3=7 items=0 ppid=2080 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.679000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:43:26.685000 audit: BPF prog-id=94 op=UNLOAD May 17 00:43:26.685000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=32 a0=3 a1=7fff554cfa30 a2=0 a3=0 items=0 ppid=2080 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip" exe="/usr/sbin/ip" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.685000 audit: PROCTITLE proctitle=6970006C696E6B0064656C0063616C69636F5F746D705F41 May 17 00:43:26.790000 audit[2256]: NETFILTER_CFG table=raw:67 family=2 entries=21 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:43:26.790000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffde0f3930 a2=0 a3=7fffde0f391c items=0 ppid=2080 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.790000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:43:26.794000 audit[2261]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:43:26.794000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff6fc617c0 a2=0 a3=7fff6fc617ac items=0 ppid=2080 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.794000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:43:26.796000 audit[2257]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:43:26.796000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc264e8850 a2=0 a3=7ffc264e883c items=0 ppid=2080 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.796000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:43:26.811000 audit[2260]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:43:26.811000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe02d0f9a0 a2=0 a3=7ffe02d0f98c items=0 ppid=2080 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:26.811000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:43:26.844140 systemd[1]: run-containerd-runc-k8s.io-b333d645e1a58f9038bce255523da3f6c792886fe116ee7e301270149623f880-runc.wFUxq0.mount: Deactivated successfully. May 17 00:43:27.477989 kubelet[1436]: E0517 00:43:27.477871 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:27.976004 systemd-networkd[998]: vxlan.calico: Gained IPv6LL May 17 00:43:28.478788 kubelet[1436]: E0517 00:43:28.478731 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:29.480161 kubelet[1436]: E0517 00:43:29.480087 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:29.494000 audit[2291]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:29.496877 kernel: kauditd_printk_skb: 550 callbacks suppressed May 17 00:43:29.497030 kernel: audit: type=1325 audit(1747442609.494:654): table=filter:71 family=2 entries=12 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:29.494000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffdc72e2f80 a2=0 a3=7ffdc72e2f6c items=0 ppid=1662 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:29.504886 kernel: audit: type=1300 audit(1747442609.494:654): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffdc72e2f80 a2=0 a3=7ffdc72e2f6c items=0 ppid=1662 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:29.505054 kernel: audit: type=1327 audit(1747442609.494:654): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:29.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:29.507790 kernel: audit: type=1325 audit(1747442609.504:655): table=nat:72 family=2 entries=34 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:29.504000 audit[2291]: NETFILTER_CFG table=nat:72 family=2 entries=34 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:29.510673 kernel: audit: type=1300 audit(1747442609.504:655): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdc72e2f80 a2=0 a3=7ffdc72e2f6c items=0 ppid=1662 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:29.504000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdc72e2f80 a2=0 a3=7ffdc72e2f6c items=0 ppid=1662 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:29.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:29.519325 kernel: audit: type=1327 audit(1747442609.504:655): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:30.481017 kubelet[1436]: E0517 00:43:30.480896 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:31.482007 kubelet[1436]: E0517 00:43:31.481944 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:32.483045 kubelet[1436]: E0517 00:43:32.482954 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:33.484087 kubelet[1436]: E0517 00:43:33.484029 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:33.665735 env[1187]: time="2025-05-17T00:43:33.665544946Z" level=info msg="StopPodSandbox for \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\"" May 17 00:43:33.766918 kubelet[1436]: I0517 00:43:33.766395 1436 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-zc8zb" podStartSLOduration=13.428755552 podStartE2EDuration="28.766366558s" podCreationTimestamp="2025-05-17 00:43:05 +0000 UTC" firstStartedPulling="2025-05-17 00:43:08.431843571 +0000 UTC m=+3.419994729" lastFinishedPulling="2025-05-17 00:43:23.769454557 +0000 UTC m=+18.757605735" observedRunningTime="2025-05-17 00:43:24.852638571 +0000 UTC m=+19.840789751" watchObservedRunningTime="2025-05-17 00:43:33.766366558 +0000 UTC m=+28.754517740" May 17 00:43:33.878525 env[1187]: 2025-05-17 00:43:33.765 [INFO][2310] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:43:33.878525 env[1187]: 2025-05-17 00:43:33.767 [INFO][2310] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" iface="eth0" netns="/var/run/netns/cni-b29718be-cac7-d02f-9c9c-346774fb61c6" May 17 00:43:33.878525 env[1187]: 2025-05-17 00:43:33.767 [INFO][2310] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" iface="eth0" netns="/var/run/netns/cni-b29718be-cac7-d02f-9c9c-346774fb61c6" May 17 00:43:33.878525 env[1187]: 2025-05-17 00:43:33.768 [INFO][2310] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" iface="eth0" netns="/var/run/netns/cni-b29718be-cac7-d02f-9c9c-346774fb61c6" May 17 00:43:33.878525 env[1187]: 2025-05-17 00:43:33.768 [INFO][2310] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:43:33.878525 env[1187]: 2025-05-17 00:43:33.768 [INFO][2310] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:43:33.878525 env[1187]: 2025-05-17 00:43:33.855 [INFO][2317] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" HandleID="k8s-pod-network.1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" Workload="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:43:33.878525 env[1187]: 2025-05-17 00:43:33.855 [INFO][2317] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:33.878525 env[1187]: 2025-05-17 00:43:33.855 [INFO][2317] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:33.878525 env[1187]: 2025-05-17 00:43:33.869 [WARNING][2317] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" HandleID="k8s-pod-network.1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" Workload="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:43:33.878525 env[1187]: 2025-05-17 00:43:33.869 [INFO][2317] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" HandleID="k8s-pod-network.1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" Workload="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:43:33.878525 env[1187]: 2025-05-17 00:43:33.872 [INFO][2317] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:33.878525 env[1187]: 2025-05-17 00:43:33.876 [INFO][2310] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:43:33.883256 env[1187]: time="2025-05-17T00:43:33.881997002Z" level=info msg="TearDown network for sandbox \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\" successfully" May 17 00:43:33.883256 env[1187]: time="2025-05-17T00:43:33.882064138Z" level=info msg="StopPodSandbox for \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\" returns successfully" May 17 00:43:33.882019 systemd[1]: run-netns-cni\x2db29718be\x2dcac7\x2dd02f\x2d9c9c\x2d346774fb61c6.mount: Deactivated successfully. May 17 00:43:33.885113 env[1187]: time="2025-05-17T00:43:33.885051485Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6lqkv,Uid:1a3ba9f2-6638-45de-97a2-7ec41db800d6,Namespace:calico-system,Attempt:1,}" May 17 00:43:34.120393 systemd-networkd[998]: califb08dd270b1: Link UP May 17 00:43:34.125228 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:43:34.125430 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califb08dd270b1: link becomes ready May 17 00:43:34.125834 systemd-networkd[998]: califb08dd270b1: Gained carrier May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:33.960 [INFO][2323] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {137.184.33.91-k8s-csi--node--driver--6lqkv-eth0 csi-node-driver- calico-system 1a3ba9f2-6638-45de-97a2-7ec41db800d6 1344 0 2025-05-17 00:43:05 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 137.184.33.91 csi-node-driver-6lqkv eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] califb08dd270b1 [] [] }} ContainerID="2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" Namespace="calico-system" Pod="csi-node-driver-6lqkv" WorkloadEndpoint="137.184.33.91-k8s-csi--node--driver--6lqkv-" May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:33.961 [INFO][2323] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" Namespace="calico-system" Pod="csi-node-driver-6lqkv" WorkloadEndpoint="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.020 [INFO][2336] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" HandleID="k8s-pod-network.2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" Workload="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.021 [INFO][2336] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" HandleID="k8s-pod-network.2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" Workload="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9020), Attrs:map[string]string{"namespace":"calico-system", "node":"137.184.33.91", "pod":"csi-node-driver-6lqkv", "timestamp":"2025-05-17 00:43:34.020559729 +0000 UTC"}, Hostname:"137.184.33.91", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.022 [INFO][2336] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.022 [INFO][2336] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.022 [INFO][2336] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '137.184.33.91' May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.039 [INFO][2336] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" host="137.184.33.91" May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.054 [INFO][2336] ipam/ipam.go 394: Looking up existing affinities for host host="137.184.33.91" May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.076 [INFO][2336] ipam/ipam.go 511: Trying affinity for 192.168.84.64/26 host="137.184.33.91" May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.079 [INFO][2336] ipam/ipam.go 158: Attempting to load block cidr=192.168.84.64/26 host="137.184.33.91" May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.085 [INFO][2336] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.84.64/26 host="137.184.33.91" May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.085 [INFO][2336] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.84.64/26 handle="k8s-pod-network.2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" host="137.184.33.91" May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.090 [INFO][2336] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932 May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.097 [INFO][2336] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.84.64/26 handle="k8s-pod-network.2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" host="137.184.33.91" May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.109 [INFO][2336] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.84.65/26] block=192.168.84.64/26 handle="k8s-pod-network.2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" host="137.184.33.91" May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.109 [INFO][2336] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.84.65/26] handle="k8s-pod-network.2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" host="137.184.33.91" May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.109 [INFO][2336] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:34.149089 env[1187]: 2025-05-17 00:43:34.109 [INFO][2336] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.84.65/26] IPv6=[] ContainerID="2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" HandleID="k8s-pod-network.2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" Workload="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:43:34.150325 env[1187]: 2025-05-17 00:43:34.112 [INFO][2323] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" Namespace="calico-system" Pod="csi-node-driver-6lqkv" WorkloadEndpoint="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"137.184.33.91-k8s-csi--node--driver--6lqkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1a3ba9f2-6638-45de-97a2-7ec41db800d6", ResourceVersion:"1344", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"137.184.33.91", ContainerID:"", Pod:"csi-node-driver-6lqkv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.84.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califb08dd270b1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:34.150325 env[1187]: 2025-05-17 00:43:34.113 [INFO][2323] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.84.65/32] ContainerID="2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" Namespace="calico-system" Pod="csi-node-driver-6lqkv" WorkloadEndpoint="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:43:34.150325 env[1187]: 2025-05-17 00:43:34.113 [INFO][2323] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califb08dd270b1 ContainerID="2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" Namespace="calico-system" Pod="csi-node-driver-6lqkv" WorkloadEndpoint="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:43:34.150325 env[1187]: 2025-05-17 00:43:34.127 [INFO][2323] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" Namespace="calico-system" Pod="csi-node-driver-6lqkv" WorkloadEndpoint="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:43:34.150325 env[1187]: 2025-05-17 00:43:34.128 [INFO][2323] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" Namespace="calico-system" Pod="csi-node-driver-6lqkv" WorkloadEndpoint="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"137.184.33.91-k8s-csi--node--driver--6lqkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1a3ba9f2-6638-45de-97a2-7ec41db800d6", ResourceVersion:"1344", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"137.184.33.91", ContainerID:"2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932", Pod:"csi-node-driver-6lqkv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.84.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califb08dd270b1", MAC:"72:52:fe:43:db:08", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:34.150325 env[1187]: 2025-05-17 00:43:34.145 [INFO][2323] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932" Namespace="calico-system" Pod="csi-node-driver-6lqkv" WorkloadEndpoint="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:43:34.175380 env[1187]: time="2025-05-17T00:43:34.175233448Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:43:34.175799 env[1187]: time="2025-05-17T00:43:34.175729803Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:43:34.176076 env[1187]: time="2025-05-17T00:43:34.176010767Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:43:34.176679 env[1187]: time="2025-05-17T00:43:34.176588864Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932 pid=2361 runtime=io.containerd.runc.v2 May 17 00:43:34.210392 systemd[1]: Started cri-containerd-2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932.scope. May 17 00:43:34.231184 kernel: audit: type=1325 audit(1747442614.190:656): table=filter:73 family=2 entries=38 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:43:34.231387 kernel: audit: type=1300 audit(1747442614.190:656): arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7fff51832870 a2=0 a3=7fff5183285c items=0 ppid=2080 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:34.190000 audit[2367]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:43:34.190000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7fff51832870 a2=0 a3=7fff5183285c items=0 ppid=2080 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:34.190000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:43:34.235860 kernel: audit: type=1327 audit(1747442614.190:656): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:43:34.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.250775 kernel: audit: type=1400 audit(1747442614.246:657): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.249000 audit: BPF prog-id=100 op=LOAD May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2361 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:34.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264396463396635303266323064386430626338343931633139383231 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2361 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:34.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264396463396635303266323064386430626338343931633139383231 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit: BPF prog-id=101 op=LOAD May 17 00:43:34.251000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002208e0 items=0 ppid=2361 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:34.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264396463396635303266323064386430626338343931633139383231 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit: BPF prog-id=102 op=LOAD May 17 00:43:34.251000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000220928 items=0 ppid=2361 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:34.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264396463396635303266323064386430626338343931633139383231 May 17 00:43:34.251000 audit: BPF prog-id=102 op=UNLOAD May 17 00:43:34.251000 audit: BPF prog-id=101 op=UNLOAD May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:34.251000 audit: BPF prog-id=103 op=LOAD May 17 00:43:34.251000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000220d38 items=0 ppid=2361 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:34.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264396463396635303266323064386430626338343931633139383231 May 17 00:43:34.274940 env[1187]: time="2025-05-17T00:43:34.274872993Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6lqkv,Uid:1a3ba9f2-6638-45de-97a2-7ec41db800d6,Namespace:calico-system,Attempt:1,} returns sandbox id \"2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932\"" May 17 00:43:34.278503 env[1187]: time="2025-05-17T00:43:34.278386425Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:43:34.485592 kubelet[1436]: E0517 00:43:34.485471 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:35.464605 systemd-networkd[998]: califb08dd270b1: Gained IPv6LL May 17 00:43:35.486323 kubelet[1436]: E0517 00:43:35.486220 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:35.917379 env[1187]: time="2025-05-17T00:43:35.917299900Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:35.921608 env[1187]: time="2025-05-17T00:43:35.921537720Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:35.931286 env[1187]: time="2025-05-17T00:43:35.931202526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:35.933312 env[1187]: time="2025-05-17T00:43:35.933152643Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:35.936315 env[1187]: time="2025-05-17T00:43:35.936212719Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:43:35.941605 env[1187]: time="2025-05-17T00:43:35.941537849Z" level=info msg="CreateContainer within sandbox \"2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:43:35.959711 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3139218606.mount: Deactivated successfully. May 17 00:43:35.966304 env[1187]: time="2025-05-17T00:43:35.966216052Z" level=info msg="CreateContainer within sandbox \"2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"19bbae6ee563fd4f488faf4de70d8abff8bf10fc9e31680e2217678f6d3c54b1\"" May 17 00:43:35.967598 env[1187]: time="2025-05-17T00:43:35.967539398Z" level=info msg="StartContainer for \"19bbae6ee563fd4f488faf4de70d8abff8bf10fc9e31680e2217678f6d3c54b1\"" May 17 00:43:36.033083 systemd[1]: run-containerd-runc-k8s.io-19bbae6ee563fd4f488faf4de70d8abff8bf10fc9e31680e2217678f6d3c54b1-runc.a9nxWk.mount: Deactivated successfully. May 17 00:43:36.039733 systemd[1]: Started cri-containerd-19bbae6ee563fd4f488faf4de70d8abff8bf10fc9e31680e2217678f6d3c54b1.scope. May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.059294 kernel: kauditd_printk_skb: 56 callbacks suppressed May 17 00:43:36.059382 kernel: audit: type=1400 audit(1747442616.057:675): avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f9628658de8 items=0 ppid=2361 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:36.066104 kernel: audit: type=1300 audit(1747442616.057:675): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f9628658de8 items=0 ppid=2361 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:36.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139626261653665653536336664346634383866616634646537306438 May 17 00:43:36.071899 kernel: audit: type=1327 audit(1747442616.057:675): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139626261653665653536336664346634383866616634646537306438 May 17 00:43:36.072081 kernel: audit: type=1400 audit(1747442616.057:676): avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.085197 kernel: audit: type=1400 audit(1747442616.057:676): avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.085377 kernel: audit: type=1400 audit(1747442616.057:676): avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.091941 kernel: audit: type=1400 audit(1747442616.057:676): avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.092119 kernel: audit: type=1400 audit(1747442616.057:676): avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.094898 env[1187]: time="2025-05-17T00:43:36.093895418Z" level=info msg="StartContainer for \"19bbae6ee563fd4f488faf4de70d8abff8bf10fc9e31680e2217678f6d3c54b1\" returns successfully" May 17 00:43:36.095337 kernel: audit: type=1400 audit(1747442616.057:676): avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.098589 env[1187]: time="2025-05-17T00:43:36.098524351Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:43:36.099920 kernel: audit: type=1400 audit(1747442616.057:676): avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit: BPF prog-id=104 op=LOAD May 17 00:43:36.057000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000300c28 items=0 ppid=2361 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:36.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139626261653665653536336664346634383866616634646537306438 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit: BPF prog-id=105 op=LOAD May 17 00:43:36.057000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000300c78 items=0 ppid=2361 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:36.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139626261653665653536336664346634383866616634646537306438 May 17 00:43:36.057000 audit: BPF prog-id=105 op=UNLOAD May 17 00:43:36.057000 audit: BPF prog-id=104 op=UNLOAD May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:36.057000 audit: BPF prog-id=106 op=LOAD May 17 00:43:36.057000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000300d08 items=0 ppid=2361 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:36.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139626261653665653536336664346634383866616634646537306438 May 17 00:43:36.486537 kubelet[1436]: E0517 00:43:36.486428 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:36.663298 env[1187]: time="2025-05-17T00:43:36.663172100Z" level=info msg="StopPodSandbox for \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\"" May 17 00:43:36.800273 env[1187]: 2025-05-17 00:43:36.738 [INFO][2443] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:43:36.800273 env[1187]: 2025-05-17 00:43:36.738 [INFO][2443] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" iface="eth0" netns="/var/run/netns/cni-90d48ccb-695e-a793-8e79-3d0ee8c18d73" May 17 00:43:36.800273 env[1187]: 2025-05-17 00:43:36.738 [INFO][2443] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" iface="eth0" netns="/var/run/netns/cni-90d48ccb-695e-a793-8e79-3d0ee8c18d73" May 17 00:43:36.800273 env[1187]: 2025-05-17 00:43:36.739 [INFO][2443] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" iface="eth0" netns="/var/run/netns/cni-90d48ccb-695e-a793-8e79-3d0ee8c18d73" May 17 00:43:36.800273 env[1187]: 2025-05-17 00:43:36.739 [INFO][2443] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:43:36.800273 env[1187]: 2025-05-17 00:43:36.739 [INFO][2443] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:43:36.800273 env[1187]: 2025-05-17 00:43:36.775 [INFO][2451] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" HandleID="k8s-pod-network.f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" Workload="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:43:36.800273 env[1187]: 2025-05-17 00:43:36.775 [INFO][2451] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:36.800273 env[1187]: 2025-05-17 00:43:36.776 [INFO][2451] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:36.800273 env[1187]: 2025-05-17 00:43:36.789 [WARNING][2451] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" HandleID="k8s-pod-network.f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" Workload="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:43:36.800273 env[1187]: 2025-05-17 00:43:36.789 [INFO][2451] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" HandleID="k8s-pod-network.f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" Workload="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:43:36.800273 env[1187]: 2025-05-17 00:43:36.793 [INFO][2451] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:36.800273 env[1187]: 2025-05-17 00:43:36.795 [INFO][2443] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:43:36.800273 env[1187]: time="2025-05-17T00:43:36.798220708Z" level=info msg="TearDown network for sandbox \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\" successfully" May 17 00:43:36.800273 env[1187]: time="2025-05-17T00:43:36.798274902Z" level=info msg="StopPodSandbox for \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\" returns successfully" May 17 00:43:36.803896 env[1187]: time="2025-05-17T00:43:36.803834014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-ggprp,Uid:14a29283-7c6b-4438-8f1e-095af8425f2a,Namespace:default,Attempt:1,}" May 17 00:43:36.956581 systemd[1]: run-netns-cni\x2d90d48ccb\x2d695e\x2da793\x2d8e79\x2d3d0ee8c18d73.mount: Deactivated successfully. May 17 00:43:37.022581 systemd-networkd[998]: cali2ea2787b5bc: Link UP May 17 00:43:37.026565 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:43:37.027138 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2ea2787b5bc: link becomes ready May 17 00:43:37.027120 systemd-networkd[998]: cali2ea2787b5bc: Gained carrier May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.882 [INFO][2461] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0 nginx-deployment-7fcdb87857- default 14a29283-7c6b-4438-8f1e-095af8425f2a 1372 0 2025-05-17 00:43:20 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 137.184.33.91 nginx-deployment-7fcdb87857-ggprp eth0 default [] [] [kns.default ksa.default.default] cali2ea2787b5bc [] [] }} ContainerID="f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" Namespace="default" Pod="nginx-deployment-7fcdb87857-ggprp" WorkloadEndpoint="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-" May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.882 [INFO][2461] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" Namespace="default" Pod="nginx-deployment-7fcdb87857-ggprp" WorkloadEndpoint="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.931 [INFO][2476] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" HandleID="k8s-pod-network.f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" Workload="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.933 [INFO][2476] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" HandleID="k8s-pod-network.f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" Workload="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9630), Attrs:map[string]string{"namespace":"default", "node":"137.184.33.91", "pod":"nginx-deployment-7fcdb87857-ggprp", "timestamp":"2025-05-17 00:43:36.931854976 +0000 UTC"}, Hostname:"137.184.33.91", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.933 [INFO][2476] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.933 [INFO][2476] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.934 [INFO][2476] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '137.184.33.91' May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.947 [INFO][2476] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" host="137.184.33.91" May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.969 [INFO][2476] ipam/ipam.go 394: Looking up existing affinities for host host="137.184.33.91" May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.981 [INFO][2476] ipam/ipam.go 511: Trying affinity for 192.168.84.64/26 host="137.184.33.91" May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.986 [INFO][2476] ipam/ipam.go 158: Attempting to load block cidr=192.168.84.64/26 host="137.184.33.91" May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.991 [INFO][2476] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.84.64/26 host="137.184.33.91" May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.991 [INFO][2476] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.84.64/26 handle="k8s-pod-network.f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" host="137.184.33.91" May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:36.995 [INFO][2476] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:37.003 [INFO][2476] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.84.64/26 handle="k8s-pod-network.f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" host="137.184.33.91" May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:37.011 [INFO][2476] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.84.66/26] block=192.168.84.64/26 handle="k8s-pod-network.f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" host="137.184.33.91" May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:37.011 [INFO][2476] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.84.66/26] handle="k8s-pod-network.f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" host="137.184.33.91" May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:37.011 [INFO][2476] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:37.043011 env[1187]: 2025-05-17 00:43:37.011 [INFO][2476] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.84.66/26] IPv6=[] ContainerID="f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" HandleID="k8s-pod-network.f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" Workload="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:43:37.047021 env[1187]: 2025-05-17 00:43:37.014 [INFO][2461] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" Namespace="default" Pod="nginx-deployment-7fcdb87857-ggprp" WorkloadEndpoint="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"14a29283-7c6b-4438-8f1e-095af8425f2a", ResourceVersion:"1372", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"137.184.33.91", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-ggprp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.84.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2ea2787b5bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:37.047021 env[1187]: 2025-05-17 00:43:37.014 [INFO][2461] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.84.66/32] ContainerID="f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" Namespace="default" Pod="nginx-deployment-7fcdb87857-ggprp" WorkloadEndpoint="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:43:37.047021 env[1187]: 2025-05-17 00:43:37.014 [INFO][2461] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2ea2787b5bc ContainerID="f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" Namespace="default" Pod="nginx-deployment-7fcdb87857-ggprp" WorkloadEndpoint="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:43:37.047021 env[1187]: 2025-05-17 00:43:37.028 [INFO][2461] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" Namespace="default" Pod="nginx-deployment-7fcdb87857-ggprp" WorkloadEndpoint="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:43:37.047021 env[1187]: 2025-05-17 00:43:37.030 [INFO][2461] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" Namespace="default" Pod="nginx-deployment-7fcdb87857-ggprp" WorkloadEndpoint="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"14a29283-7c6b-4438-8f1e-095af8425f2a", ResourceVersion:"1372", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"137.184.33.91", ContainerID:"f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e", Pod:"nginx-deployment-7fcdb87857-ggprp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.84.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2ea2787b5bc", MAC:"b2:e5:8e:75:f7:3b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:37.047021 env[1187]: 2025-05-17 00:43:37.040 [INFO][2461] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e" Namespace="default" Pod="nginx-deployment-7fcdb87857-ggprp" WorkloadEndpoint="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:43:37.067000 audit[2491]: NETFILTER_CFG table=filter:74 family=2 entries=42 op=nft_register_chain pid=2491 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:43:37.067000 audit[2491]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffec4e7c070 a2=0 a3=7ffec4e7c05c items=0 ppid=2080 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:37.067000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:43:37.078363 env[1187]: time="2025-05-17T00:43:37.078211452Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:43:37.078363 env[1187]: time="2025-05-17T00:43:37.078272921Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:43:37.078792 env[1187]: time="2025-05-17T00:43:37.078302934Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:43:37.079052 env[1187]: time="2025-05-17T00:43:37.079006454Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e pid=2499 runtime=io.containerd.runc.v2 May 17 00:43:37.104493 systemd[1]: Started cri-containerd-f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e.scope. May 17 00:43:37.115788 systemd[1]: run-containerd-runc-k8s.io-f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e-runc.nGp6L6.mount: Deactivated successfully. May 17 00:43:37.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.148000 audit: BPF prog-id=107 op=LOAD May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2499 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:37.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653335373862313764356539366532643331313535326565306462 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2499 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:37.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653335373862313764356539366532643331313535326565306462 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit: BPF prog-id=108 op=LOAD May 17 00:43:37.149000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000314c30 items=0 ppid=2499 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:37.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653335373862313764356539366532643331313535326565306462 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit: BPF prog-id=109 op=LOAD May 17 00:43:37.149000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000314c78 items=0 ppid=2499 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:37.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653335373862313764356539366532643331313535326565306462 May 17 00:43:37.149000 audit: BPF prog-id=109 op=UNLOAD May 17 00:43:37.149000 audit: BPF prog-id=108 op=UNLOAD May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.149000 audit: BPF prog-id=110 op=LOAD May 17 00:43:37.149000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000315088 items=0 ppid=2499 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:37.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653335373862313764356539366532643331313535326565306462 May 17 00:43:37.206130 env[1187]: time="2025-05-17T00:43:37.206047194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-ggprp,Uid:14a29283-7c6b-4438-8f1e-095af8425f2a,Namespace:default,Attempt:1,} returns sandbox id \"f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e\"" May 17 00:43:37.486999 kubelet[1436]: E0517 00:43:37.486884 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:37.789404 env[1187]: time="2025-05-17T00:43:37.789221384Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:37.791346 env[1187]: time="2025-05-17T00:43:37.791283742Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:37.794301 env[1187]: time="2025-05-17T00:43:37.794232952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:37.796987 env[1187]: time="2025-05-17T00:43:37.796922969Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:37.797239 env[1187]: time="2025-05-17T00:43:37.797209777Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:43:37.801099 env[1187]: time="2025-05-17T00:43:37.801003886Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:43:37.805873 env[1187]: time="2025-05-17T00:43:37.805805156Z" level=info msg="CreateContainer within sandbox \"2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:43:37.827642 env[1187]: time="2025-05-17T00:43:37.827529305Z" level=info msg="CreateContainer within sandbox \"2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b477121d77b659a8c95c727ccbc799fdcb9b2f4393b134ede9b2e5aebd2722e4\"" May 17 00:43:37.829152 env[1187]: time="2025-05-17T00:43:37.829036693Z" level=info msg="StartContainer for \"b477121d77b659a8c95c727ccbc799fdcb9b2f4393b134ede9b2e5aebd2722e4\"" May 17 00:43:37.863061 systemd[1]: Started cri-containerd-b477121d77b659a8c95c727ccbc799fdcb9b2f4393b134ede9b2e5aebd2722e4.scope. May 17 00:43:37.891000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f9650755918 items=0 ppid=2361 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:37.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234373731323164373762363539613863393563373237636362633739 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit: BPF prog-id=111 op=LOAD May 17 00:43:37.891000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00035fba8 items=0 ppid=2361 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:37.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234373731323164373762363539613863393563373237636362633739 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.891000 audit: BPF prog-id=112 op=LOAD May 17 00:43:37.891000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00035fbf8 items=0 ppid=2361 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:37.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234373731323164373762363539613863393563373237636362633739 May 17 00:43:37.892000 audit: BPF prog-id=112 op=UNLOAD May 17 00:43:37.893000 audit: BPF prog-id=111 op=UNLOAD May 17 00:43:37.894000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.894000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.894000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.894000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.894000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.894000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.894000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.894000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.894000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.894000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:37.894000 audit: BPF prog-id=113 op=LOAD May 17 00:43:37.894000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00035fc88 items=0 ppid=2361 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:37.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234373731323164373762363539613863393563373237636362633739 May 17 00:43:37.922153 env[1187]: time="2025-05-17T00:43:37.922074851Z" level=info msg="StartContainer for \"b477121d77b659a8c95c727ccbc799fdcb9b2f4393b134ede9b2e5aebd2722e4\" returns successfully" May 17 00:43:37.957068 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1570640826.mount: Deactivated successfully. May 17 00:43:38.487675 kubelet[1436]: E0517 00:43:38.487585 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:38.602306 kubelet[1436]: I0517 00:43:38.601643 1436 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:43:38.602306 kubelet[1436]: I0517 00:43:38.601749 1436 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:43:38.921130 systemd-networkd[998]: cali2ea2787b5bc: Gained IPv6LL May 17 00:43:39.488570 kubelet[1436]: E0517 00:43:39.488510 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:40.489522 kubelet[1436]: E0517 00:43:40.489442 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:40.760448 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3617430850.mount: Deactivated successfully. May 17 00:43:41.490368 kubelet[1436]: E0517 00:43:41.490275 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:42.491236 kubelet[1436]: E0517 00:43:42.491166 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:42.812861 env[1187]: time="2025-05-17T00:43:42.812172381Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:42.816861 env[1187]: time="2025-05-17T00:43:42.816789021Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:42.819135 env[1187]: time="2025-05-17T00:43:42.819066627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:42.821823 env[1187]: time="2025-05-17T00:43:42.821763543Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:42.823483 env[1187]: time="2025-05-17T00:43:42.823356415Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:43:42.830193 env[1187]: time="2025-05-17T00:43:42.830121802Z" level=info msg="CreateContainer within sandbox \"f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 17 00:43:42.849859 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount780932518.mount: Deactivated successfully. May 17 00:43:42.862340 env[1187]: time="2025-05-17T00:43:42.862265403Z" level=info msg="CreateContainer within sandbox \"f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"7611836dc4447f99a1177744152709996dfa766ebaca34d4a0eb5ff8799213e9\"" May 17 00:43:42.863794 env[1187]: time="2025-05-17T00:43:42.863735130Z" level=info msg="StartContainer for \"7611836dc4447f99a1177744152709996dfa766ebaca34d4a0eb5ff8799213e9\"" May 17 00:43:42.864898 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2194939080.mount: Deactivated successfully. May 17 00:43:42.905452 systemd[1]: Started cri-containerd-7611836dc4447f99a1177744152709996dfa766ebaca34d4a0eb5ff8799213e9.scope. May 17 00:43:42.934029 kernel: kauditd_printk_skb: 136 callbacks suppressed May 17 00:43:42.934188 kernel: audit: type=1400 audit(1747442622.931:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.944584 kernel: audit: type=1400 audit(1747442622.931:707): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.945006 kernel: audit: type=1400 audit(1747442622.931:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.950848 kernel: audit: type=1400 audit(1747442622.931:709): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.951252 kernel: audit: type=1400 audit(1747442622.931:710): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.970893 kernel: audit: type=1400 audit(1747442622.931:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.971119 kernel: audit: type=1400 audit(1747442622.931:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.974063 kernel: audit: type=1400 audit(1747442622.931:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.977720 kernel: audit: type=1400 audit(1747442622.931:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.933000 audit: BPF prog-id=114 op=LOAD May 17 00:43:42.980712 kernel: audit: type=1400 audit(1747442622.933:715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2499 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:42.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736313138333664633434343766393961313137373734343135323730 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2499 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:42.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736313138333664633434343766393961313137373734343135323730 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit: BPF prog-id=115 op=LOAD May 17 00:43:42.936000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000303670 items=0 ppid=2499 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:42.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736313138333664633434343766393961313137373734343135323730 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.936000 audit: BPF prog-id=116 op=LOAD May 17 00:43:42.936000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003036b8 items=0 ppid=2499 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:42.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736313138333664633434343766393961313137373734343135323730 May 17 00:43:42.936000 audit: BPF prog-id=116 op=UNLOAD May 17 00:43:42.936000 audit: BPF prog-id=115 op=UNLOAD May 17 00:43:42.937000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.937000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.937000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.937000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.937000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.937000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.937000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.937000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.937000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.937000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:42.937000 audit: BPF prog-id=117 op=LOAD May 17 00:43:42.937000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000303ac8 items=0 ppid=2499 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:42.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736313138333664633434343766393961313137373734343135323730 May 17 00:43:42.990505 env[1187]: time="2025-05-17T00:43:42.990433652Z" level=info msg="StartContainer for \"7611836dc4447f99a1177744152709996dfa766ebaca34d4a0eb5ff8799213e9\" returns successfully" May 17 00:43:43.327323 systemd[1]: Started sshd@7-137.184.33.91:22-218.92.0.154:53991.service. May 17 00:43:43.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-137.184.33.91:22-218.92.0.154:53991 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:43:43.492483 kubelet[1436]: E0517 00:43:43.492374 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:43.888754 kubelet[1436]: I0517 00:43:43.888634 1436 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-6lqkv" podStartSLOduration=35.366946475 podStartE2EDuration="38.888590447s" podCreationTimestamp="2025-05-17 00:43:05 +0000 UTC" firstStartedPulling="2025-05-17 00:43:34.277349149 +0000 UTC m=+29.265500326" lastFinishedPulling="2025-05-17 00:43:37.798993084 +0000 UTC m=+32.787144298" observedRunningTime="2025-05-17 00:43:38.874347493 +0000 UTC m=+33.862498672" watchObservedRunningTime="2025-05-17 00:43:43.888590447 +0000 UTC m=+38.876741625" May 17 00:43:43.889295 kubelet[1436]: I0517 00:43:43.889146 1436 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-ggprp" podStartSLOduration=18.270551911 podStartE2EDuration="23.889114458s" podCreationTimestamp="2025-05-17 00:43:20 +0000 UTC" firstStartedPulling="2025-05-17 00:43:37.207532585 +0000 UTC m=+32.195683758" lastFinishedPulling="2025-05-17 00:43:42.826095144 +0000 UTC m=+37.814246305" observedRunningTime="2025-05-17 00:43:43.888909007 +0000 UTC m=+38.877060182" watchObservedRunningTime="2025-05-17 00:43:43.889114458 +0000 UTC m=+38.877265636" May 17 00:43:44.253380 sshd[2628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.154 user=root May 17 00:43:44.252000 audit[2628]: USER_AUTH pid=2628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.154 addr=218.92.0.154 terminal=ssh res=failed' May 17 00:43:44.493299 kubelet[1436]: E0517 00:43:44.493223 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:45.461929 kubelet[1436]: E0517 00:43:45.461846 1436 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:45.493733 kubelet[1436]: E0517 00:43:45.493681 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:45.839882 update_engine[1183]: I0517 00:43:45.839334 1183 update_attempter.cc:509] Updating boot flags... May 17 00:43:46.225772 sshd[2628]: Failed password for root from 218.92.0.154 port 53991 ssh2 May 17 00:43:46.494980 kubelet[1436]: E0517 00:43:46.494488 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:47.495894 kubelet[1436]: E0517 00:43:47.495801 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:48.496722 kubelet[1436]: E0517 00:43:48.496671 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:49.498074 kubelet[1436]: E0517 00:43:49.498001 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:50.498456 kubelet[1436]: E0517 00:43:50.498371 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:51.356000 audit[2653]: NETFILTER_CFG table=filter:75 family=2 entries=24 op=nft_register_rule pid=2653 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:51.360430 kernel: kauditd_printk_skb: 49 callbacks suppressed May 17 00:43:51.360532 kernel: audit: type=1325 audit(1747442631.356:726): table=filter:75 family=2 entries=24 op=nft_register_rule pid=2653 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:51.360564 kernel: audit: type=1300 audit(1747442631.356:726): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffdfc627670 a2=0 a3=7ffdfc62765c items=0 ppid=1662 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.356000 audit[2653]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffdfc627670 a2=0 a3=7ffdfc62765c items=0 ppid=1662 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:51.366973 kernel: audit: type=1327 audit(1747442631.356:726): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:51.367000 audit[2653]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=2653 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:51.367000 audit[2653]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdfc627670 a2=0 a3=0 items=0 ppid=1662 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.375629 kernel: audit: type=1325 audit(1747442631.367:727): table=nat:76 family=2 entries=22 op=nft_register_rule pid=2653 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:51.375840 kernel: audit: type=1300 audit(1747442631.367:727): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdfc627670 a2=0 a3=0 items=0 ppid=1662 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.375891 kernel: audit: type=1327 audit(1747442631.367:727): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:51.367000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:51.433000 audit[2655]: NETFILTER_CFG table=filter:77 family=2 entries=36 op=nft_register_rule pid=2655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:51.433000 audit[2655]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fff74507590 a2=0 a3=7fff7450757c items=0 ppid=1662 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.442059 kernel: audit: type=1325 audit(1747442631.433:728): table=filter:77 family=2 entries=36 op=nft_register_rule pid=2655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:51.442278 kernel: audit: type=1300 audit(1747442631.433:728): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fff74507590 a2=0 a3=7fff7450757c items=0 ppid=1662 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.442318 kernel: audit: type=1327 audit(1747442631.433:728): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:51.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:51.448000 audit[2655]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=2655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:51.448000 audit[2655]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff74507590 a2=0 a3=0 items=0 ppid=1662 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:51.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:51.452715 kernel: audit: type=1325 audit(1747442631.448:729): table=nat:78 family=2 entries=22 op=nft_register_rule pid=2655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:51.499595 kubelet[1436]: E0517 00:43:51.499525 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:51.727944 systemd[1]: Created slice kubepods-besteffort-podf4f52393_b741_4076_a19b_47436ffcca1b.slice. May 17 00:43:51.891305 kubelet[1436]: I0517 00:43:51.891234 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/f4f52393-b741-4076-a19b-47436ffcca1b-data\") pod \"nfs-server-provisioner-0\" (UID: \"f4f52393-b741-4076-a19b-47436ffcca1b\") " pod="default/nfs-server-provisioner-0" May 17 00:43:51.891808 kubelet[1436]: I0517 00:43:51.891763 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wj5gt\" (UniqueName: \"kubernetes.io/projected/f4f52393-b741-4076-a19b-47436ffcca1b-kube-api-access-wj5gt\") pod \"nfs-server-provisioner-0\" (UID: \"f4f52393-b741-4076-a19b-47436ffcca1b\") " pod="default/nfs-server-provisioner-0" May 17 00:43:52.033381 env[1187]: time="2025-05-17T00:43:52.033199314Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f4f52393-b741-4076-a19b-47436ffcca1b,Namespace:default,Attempt:0,}" May 17 00:43:52.294981 systemd-networkd[998]: cali60e51b789ff: Link UP May 17 00:43:52.298767 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:43:52.299866 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 17 00:43:52.299214 systemd-networkd[998]: cali60e51b789ff: Gained carrier May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.114 [INFO][2657] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {137.184.33.91-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default f4f52393-b741-4076-a19b-47436ffcca1b 1452 0 2025-05-17 00:43:51 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 137.184.33.91 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="137.184.33.91-k8s-nfs--server--provisioner--0-" May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.114 [INFO][2657] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="137.184.33.91-k8s-nfs--server--provisioner--0-eth0" May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.161 [INFO][2670] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" HandleID="k8s-pod-network.4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" Workload="137.184.33.91-k8s-nfs--server--provisioner--0-eth0" May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.161 [INFO][2670] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" HandleID="k8s-pod-network.4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" Workload="137.184.33.91-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d16d0), Attrs:map[string]string{"namespace":"default", "node":"137.184.33.91", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-17 00:43:52.161311229 +0000 UTC"}, Hostname:"137.184.33.91", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.161 [INFO][2670] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.161 [INFO][2670] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.161 [INFO][2670] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '137.184.33.91' May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.183 [INFO][2670] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" host="137.184.33.91" May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.206 [INFO][2670] ipam/ipam.go 394: Looking up existing affinities for host host="137.184.33.91" May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.232 [INFO][2670] ipam/ipam.go 511: Trying affinity for 192.168.84.64/26 host="137.184.33.91" May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.243 [INFO][2670] ipam/ipam.go 158: Attempting to load block cidr=192.168.84.64/26 host="137.184.33.91" May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.249 [INFO][2670] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.84.64/26 host="137.184.33.91" May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.249 [INFO][2670] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.84.64/26 handle="k8s-pod-network.4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" host="137.184.33.91" May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.253 [INFO][2670] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.265 [INFO][2670] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.84.64/26 handle="k8s-pod-network.4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" host="137.184.33.91" May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.286 [INFO][2670] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.84.67/26] block=192.168.84.64/26 handle="k8s-pod-network.4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" host="137.184.33.91" May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.286 [INFO][2670] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.84.67/26] handle="k8s-pod-network.4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" host="137.184.33.91" May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.286 [INFO][2670] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:43:52.328281 env[1187]: 2025-05-17 00:43:52.286 [INFO][2670] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.84.67/26] IPv6=[] ContainerID="4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" HandleID="k8s-pod-network.4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" Workload="137.184.33.91-k8s-nfs--server--provisioner--0-eth0" May 17 00:43:52.329322 env[1187]: 2025-05-17 00:43:52.288 [INFO][2657] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="137.184.33.91-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"137.184.33.91-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f4f52393-b741-4076-a19b-47436ffcca1b", ResourceVersion:"1452", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"137.184.33.91", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.84.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:52.329322 env[1187]: 2025-05-17 00:43:52.289 [INFO][2657] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.84.67/32] ContainerID="4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="137.184.33.91-k8s-nfs--server--provisioner--0-eth0" May 17 00:43:52.329322 env[1187]: 2025-05-17 00:43:52.289 [INFO][2657] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="137.184.33.91-k8s-nfs--server--provisioner--0-eth0" May 17 00:43:52.329322 env[1187]: 2025-05-17 00:43:52.300 [INFO][2657] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="137.184.33.91-k8s-nfs--server--provisioner--0-eth0" May 17 00:43:52.329534 env[1187]: 2025-05-17 00:43:52.301 [INFO][2657] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="137.184.33.91-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"137.184.33.91-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f4f52393-b741-4076-a19b-47436ffcca1b", ResourceVersion:"1452", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"137.184.33.91", ContainerID:"4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.84.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ce:4f:b4:84:71:00", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:43:52.329534 env[1187]: 2025-05-17 00:43:52.326 [INFO][2657] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="137.184.33.91-k8s-nfs--server--provisioner--0-eth0" May 17 00:43:52.349864 env[1187]: time="2025-05-17T00:43:52.349539416Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:43:52.349864 env[1187]: time="2025-05-17T00:43:52.349589156Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:43:52.349864 env[1187]: time="2025-05-17T00:43:52.349603380Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:43:52.350707 env[1187]: time="2025-05-17T00:43:52.350574995Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a pid=2692 runtime=io.containerd.runc.v2 May 17 00:43:52.371000 audit[2709]: NETFILTER_CFG table=filter:79 family=2 entries=40 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:43:52.371000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffe347da670 a2=0 a3=7ffe347da65c items=0 ppid=2080 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:52.371000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:43:52.378285 systemd[1]: Started cri-containerd-4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a.scope. May 17 00:43:52.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.421000 audit: BPF prog-id=118 op=LOAD May 17 00:43:52.422000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.422000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2692 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:52.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393766353838323165343665333637313762393163313631666561 May 17 00:43:52.422000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.422000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2692 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:52.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393766353838323165343665333637313762393163313631666561 May 17 00:43:52.422000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.422000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.422000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.422000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.422000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.422000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.422000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.422000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.422000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.422000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.422000 audit: BPF prog-id=119 op=LOAD May 17 00:43:52.422000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024390 items=0 ppid=2692 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:52.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393766353838323165343665333637313762393163313631666561 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit: BPF prog-id=120 op=LOAD May 17 00:43:52.423000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0000243d8 items=0 ppid=2692 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:52.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393766353838323165343665333637313762393163313631666561 May 17 00:43:52.423000 audit: BPF prog-id=120 op=UNLOAD May 17 00:43:52.423000 audit: BPF prog-id=119 op=UNLOAD May 17 00:43:52.423000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:52.423000 audit: BPF prog-id=121 op=LOAD May 17 00:43:52.423000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000247e8 items=0 ppid=2692 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:52.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438393766353838323165343665333637313762393163313631666561 May 17 00:43:52.471410 env[1187]: time="2025-05-17T00:43:52.471357003Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f4f52393-b741-4076-a19b-47436ffcca1b,Namespace:default,Attempt:0,} returns sandbox id \"4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a\"" May 17 00:43:52.474361 env[1187]: time="2025-05-17T00:43:52.474301771Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 17 00:43:52.500007 kubelet[1436]: E0517 00:43:52.499922 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:53.011893 systemd[1]: run-containerd-runc-k8s.io-4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a-runc.wN8ey0.mount: Deactivated successfully. May 17 00:43:53.500589 kubelet[1436]: E0517 00:43:53.500518 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:53.703979 systemd-networkd[998]: cali60e51b789ff: Gained IPv6LL May 17 00:43:54.500991 kubelet[1436]: E0517 00:43:54.500932 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:55.087324 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1267058465.mount: Deactivated successfully. May 17 00:43:55.501501 kubelet[1436]: E0517 00:43:55.501419 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:56.508081 kubelet[1436]: E0517 00:43:56.508013 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:56.861977 systemd[1]: run-containerd-runc-k8s.io-b333d645e1a58f9038bce255523da3f6c792886fe116ee7e301270149623f880-runc.kIL5f7.mount: Deactivated successfully. May 17 00:43:57.509401 kubelet[1436]: E0517 00:43:57.509320 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:58.135380 env[1187]: time="2025-05-17T00:43:58.135305860Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:58.137341 env[1187]: time="2025-05-17T00:43:58.137224039Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:58.141628 env[1187]: time="2025-05-17T00:43:58.141561972Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:58.147713 env[1187]: time="2025-05-17T00:43:58.147623770Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:43:58.150406 env[1187]: time="2025-05-17T00:43:58.149727814Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 17 00:43:58.166767 env[1187]: time="2025-05-17T00:43:58.166705610Z" level=info msg="CreateContainer within sandbox \"4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 17 00:43:58.187472 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount97647288.mount: Deactivated successfully. May 17 00:43:58.213808 env[1187]: time="2025-05-17T00:43:58.213746079Z" level=info msg="CreateContainer within sandbox \"4897f58821e46e36717b91c161feae100806c408b2eafd8560f30c00446eaa6a\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"d2cb9eedfc1d1d81f7e1e71ac41746909fe7bd0e2c64de22cc34fff87f0ece9e\"" May 17 00:43:58.215084 env[1187]: time="2025-05-17T00:43:58.215028550Z" level=info msg="StartContainer for \"d2cb9eedfc1d1d81f7e1e71ac41746909fe7bd0e2c64de22cc34fff87f0ece9e\"" May 17 00:43:58.250015 systemd[1]: Started cri-containerd-d2cb9eedfc1d1d81f7e1e71ac41746909fe7bd0e2c64de22cc34fff87f0ece9e.scope. May 17 00:43:58.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.276314 kernel: kauditd_printk_skb: 62 callbacks suppressed May 17 00:43:58.276461 kernel: audit: type=1400 audit(1747442638.273:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.280697 kernel: audit: type=1400 audit(1747442638.273:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.280900 kernel: audit: type=1400 audit(1747442638.273:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.285259 kernel: audit: type=1400 audit(1747442638.273:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.288836 kernel: audit: type=1400 audit(1747442638.273:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.293715 kernel: audit: type=1400 audit(1747442638.273:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.299558 kernel: audit: type=1400 audit(1747442638.273:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.299732 kernel: audit: type=1400 audit(1747442638.273:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.299775 kernel: audit: type=1400 audit(1747442638.273:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.273000 audit: BPF prog-id=122 op=LOAD May 17 00:43:58.274000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.274000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2692 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:58.307783 kernel: audit: type=1400 audit(1747442638.273:758): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432636239656564666331643164383166376531653731616334313734 May 17 00:43:58.274000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.274000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2692 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:58.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432636239656564666331643164383166376531653731616334313734 May 17 00:43:58.275000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.275000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.275000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.275000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.275000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.275000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.275000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.275000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.275000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.275000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.275000 audit: BPF prog-id=123 op=LOAD May 17 00:43:58.275000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00026bed0 items=0 ppid=2692 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:58.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432636239656564666331643164383166376531653731616334313734 May 17 00:43:58.277000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.277000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.277000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.277000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.277000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.277000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.277000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.277000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.277000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.277000 audit: BPF prog-id=124 op=LOAD May 17 00:43:58.277000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00026bf18 items=0 ppid=2692 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:58.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432636239656564666331643164383166376531653731616334313734 May 17 00:43:58.281000 audit: BPF prog-id=124 op=UNLOAD May 17 00:43:58.281000 audit: BPF prog-id=123 op=UNLOAD May 17 00:43:58.281000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.281000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.281000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.281000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.281000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.281000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.281000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.281000 audit[2760]: AVC avc: denied { perfmon } for pid=2760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.281000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.281000 audit[2760]: AVC avc: denied { bpf } for pid=2760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:43:58.281000 audit: BPF prog-id=125 op=LOAD May 17 00:43:58.281000 audit[2760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003de328 items=0 ppid=2692 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:58.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432636239656564666331643164383166376531653731616334313734 May 17 00:43:58.327950 env[1187]: time="2025-05-17T00:43:58.327869759Z" level=info msg="StartContainer for \"d2cb9eedfc1d1d81f7e1e71ac41746909fe7bd0e2c64de22cc34fff87f0ece9e\" returns successfully" May 17 00:43:58.386000 audit[2792]: AVC avc: denied { search } for pid=2792 comm="rpcbind" name="crypto" dev="proc" ino=23558 scontext=system_u:system_r:svirt_lxc_net_t:s0:c367,c871 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:43:58.386000 audit[2792]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbb408540c0 a2=0 a3=0 items=0 ppid=2772 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c367,c871 key=(null) May 17 00:43:58.386000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 17 00:43:58.432000 audit[2797]: AVC avc: denied { search } for pid=2797 comm="dbus-daemon" name="crypto" dev="proc" ino=23558 scontext=system_u:system_r:svirt_lxc_net_t:s0:c367,c871 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:43:58.432000 audit[2797]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fded19650c0 a2=0 a3=0 items=0 ppid=2772 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c367,c871 key=(null) May 17 00:43:58.432000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:43:58.437000 audit[2798]: AVC avc: denied { watch } for pid=2798 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537549 scontext=system_u:system_r:svirt_lxc_net_t:s0:c367,c871 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c367,c871 tclass=dir permissive=0 May 17 00:43:58.437000 audit[2798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55d8e0714b50 a2=2c8 a3=7ffffda3dcac items=0 ppid=2772 pid=2798 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c367,c871 key=(null) May 17 00:43:58.437000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:43:58.443000 audit[2799]: AVC avc: denied { read } for pid=2799 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23652 scontext=system_u:system_r:svirt_lxc_net_t:s0:c367,c871 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 17 00:43:58.443000 audit[2799]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7efdb4a4b320 a1=80000 a2=d a3=7ffc00851ea0 items=0 ppid=2772 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c367,c871 key=(null) May 17 00:43:58.443000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:43:58.445000 audit[2799]: AVC avc: denied { search } for pid=2799 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23558 scontext=system_u:system_r:svirt_lxc_net_t:s0:c367,c871 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:43:58.445000 audit[2799]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7efdb3f9f0c0 a2=0 a3=0 items=0 ppid=2772 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c367,c871 key=(null) May 17 00:43:58.445000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:43:58.510249 kubelet[1436]: E0517 00:43:58.510168 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:43:58.999000 audit[2820]: NETFILTER_CFG table=filter:80 family=2 entries=24 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:58.999000 audit[2820]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc0207bcc0 a2=0 a3=7ffc0207bcac items=0 ppid=1662 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:58.999000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:59.005000 audit[2820]: NETFILTER_CFG table=nat:81 family=2 entries=106 op=nft_register_chain pid=2820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:43:59.005000 audit[2820]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc0207bcc0 a2=0 a3=7ffc0207bcac items=0 ppid=1662 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:43:59.005000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:43:59.177941 systemd[1]: run-containerd-runc-k8s.io-d2cb9eedfc1d1d81f7e1e71ac41746909fe7bd0e2c64de22cc34fff87f0ece9e-runc.ZD2mpx.mount: Deactivated successfully. May 17 00:43:59.511255 kubelet[1436]: E0517 00:43:59.511196 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:00.512812 kubelet[1436]: E0517 00:44:00.512692 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:01.514041 kubelet[1436]: E0517 00:44:01.513969 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:02.514944 kubelet[1436]: E0517 00:44:02.514883 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:03.516201 kubelet[1436]: E0517 00:44:03.516147 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:03.733767 kubelet[1436]: I0517 00:44:03.733697 1436 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=7.054972284 podStartE2EDuration="12.733676123s" podCreationTimestamp="2025-05-17 00:43:51 +0000 UTC" firstStartedPulling="2025-05-17 00:43:52.473582204 +0000 UTC m=+47.461733364" lastFinishedPulling="2025-05-17 00:43:58.152286043 +0000 UTC m=+53.140437203" observedRunningTime="2025-05-17 00:43:58.947920746 +0000 UTC m=+53.936072161" watchObservedRunningTime="2025-05-17 00:44:03.733676123 +0000 UTC m=+58.721827294" May 17 00:44:03.743488 systemd[1]: Created slice kubepods-besteffort-podbcf52181_aff8_4f2a_b973_952b8f0efe99.slice. May 17 00:44:03.877618 kubelet[1436]: I0517 00:44:03.876998 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-2ccb5533-9e18-4a84-a81d-2321697a00de\" (UniqueName: \"kubernetes.io/nfs/bcf52181-aff8-4f2a-b973-952b8f0efe99-pvc-2ccb5533-9e18-4a84-a81d-2321697a00de\") pod \"test-pod-1\" (UID: \"bcf52181-aff8-4f2a-b973-952b8f0efe99\") " pod="default/test-pod-1" May 17 00:44:03.877618 kubelet[1436]: I0517 00:44:03.877058 1436 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xnw4m\" (UniqueName: \"kubernetes.io/projected/bcf52181-aff8-4f2a-b973-952b8f0efe99-kube-api-access-xnw4m\") pod \"test-pod-1\" (UID: \"bcf52181-aff8-4f2a-b973-952b8f0efe99\") " pod="default/test-pod-1" May 17 00:44:04.012159 kernel: Failed to create system directory netfs May 17 00:44:04.012375 kernel: kauditd_printk_skb: 68 callbacks suppressed May 17 00:44:04.012426 kernel: audit: type=1400 audit(1747442643.999:774): avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:03.999000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.017113 kernel: Failed to create system directory netfs May 17 00:44:04.017284 kernel: Failed to create system directory netfs May 17 00:44:04.017316 kernel: audit: type=1400 audit(1747442643.999:774): avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:03.999000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.020620 kernel: Failed to create system directory netfs May 17 00:44:04.020793 kernel: audit: type=1400 audit(1747442643.999:774): avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:03.999000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:03.999000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.026934 kernel: audit: type=1400 audit(1747442643.999:774): avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:03.999000 audit[2825]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5633b0d975e0 a1=153bc a2=5633af0262b0 a3=5 items=0 ppid=464 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:03.999000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:44:04.037560 kernel: audit: type=1300 audit(1747442643.999:774): arch=c000003e syscall=175 success=yes exit=0 a0=5633b0d975e0 a1=153bc a2=5633af0262b0 a3=5 items=0 ppid=464 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.037735 kernel: audit: type=1327 audit(1747442643.999:774): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:44:04.047119 kernel: Failed to create system directory fscache May 17 00:44:04.047292 kernel: audit: type=1400 audit(1747442644.038:775): avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.047336 kernel: Failed to create system directory fscache May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.050238 kernel: audit: type=1400 audit(1747442644.038:775): avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.050409 kernel: Failed to create system directory fscache May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.053589 kernel: audit: type=1400 audit(1747442644.038:775): avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.053760 kernel: Failed to create system directory fscache May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.056699 kernel: audit: type=1400 audit(1747442644.038:775): avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.056898 kernel: Failed to create system directory fscache May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.057669 kernel: Failed to create system directory fscache May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.058806 kernel: Failed to create system directory fscache May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.060272 kernel: Failed to create system directory fscache May 17 00:44:04.060346 kernel: Failed to create system directory fscache May 17 00:44:04.060381 kernel: Failed to create system directory fscache May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.061705 kernel: Failed to create system directory fscache May 17 00:44:04.061784 kernel: Failed to create system directory fscache May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.062889 kernel: Failed to create system directory fscache May 17 00:44:04.063008 kernel: Failed to create system directory fscache May 17 00:44:04.038000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.065683 kernel: FS-Cache: Loaded May 17 00:44:04.038000 audit[2825]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5633b0fac9c0 a1=4c0fc a2=5633af0262b0 a3=5 items=0 ppid=464 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.038000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.114072 kernel: Failed to create system directory sunrpc May 17 00:44:04.114156 kernel: Failed to create system directory sunrpc May 17 00:44:04.114179 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.115847 kernel: Failed to create system directory sunrpc May 17 00:44:04.115919 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.117068 kernel: Failed to create system directory sunrpc May 17 00:44:04.117164 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.117778 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.119199 kernel: Failed to create system directory sunrpc May 17 00:44:04.119275 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.120795 kernel: Failed to create system directory sunrpc May 17 00:44:04.120906 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.123196 kernel: Failed to create system directory sunrpc May 17 00:44:04.123252 kernel: Failed to create system directory sunrpc May 17 00:44:04.123306 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.125185 kernel: Failed to create system directory sunrpc May 17 00:44:04.125260 kernel: Failed to create system directory sunrpc May 17 00:44:04.125296 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.126994 kernel: Failed to create system directory sunrpc May 17 00:44:04.127054 kernel: Failed to create system directory sunrpc May 17 00:44:04.127082 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.127707 kernel: Failed to create system directory sunrpc May 17 00:44:04.129978 kernel: Failed to create system directory sunrpc May 17 00:44:04.130076 kernel: Failed to create system directory sunrpc May 17 00:44:04.130099 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.131441 kernel: Failed to create system directory sunrpc May 17 00:44:04.131555 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.132343 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.134055 kernel: Failed to create system directory sunrpc May 17 00:44:04.134258 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.135825 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.136693 kernel: Failed to create system directory sunrpc May 17 00:44:04.136762 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.137861 kernel: Failed to create system directory sunrpc May 17 00:44:04.137955 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.139213 kernel: Failed to create system directory sunrpc May 17 00:44:04.139274 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.141051 kernel: Failed to create system directory sunrpc May 17 00:44:04.141130 kernel: Failed to create system directory sunrpc May 17 00:44:04.141155 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.142200 kernel: Failed to create system directory sunrpc May 17 00:44:04.142250 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.143767 kernel: Failed to create system directory sunrpc May 17 00:44:04.143850 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.145078 kernel: Failed to create system directory sunrpc May 17 00:44:04.145144 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.146198 kernel: Failed to create system directory sunrpc May 17 00:44:04.146252 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.146817 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.148042 kernel: Failed to create system directory sunrpc May 17 00:44:04.148123 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.149276 kernel: Failed to create system directory sunrpc May 17 00:44:04.149342 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.156035 kernel: Failed to create system directory sunrpc May 17 00:44:04.156229 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.157284 kernel: Failed to create system directory sunrpc May 17 00:44:04.157397 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.159250 kernel: Failed to create system directory sunrpc May 17 00:44:04.159398 kernel: Failed to create system directory sunrpc May 17 00:44:04.159449 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.159781 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.160991 kernel: Failed to create system directory sunrpc May 17 00:44:04.161075 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.162172 kernel: Failed to create system directory sunrpc May 17 00:44:04.162223 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.164146 kernel: Failed to create system directory sunrpc May 17 00:44:04.164222 kernel: Failed to create system directory sunrpc May 17 00:44:04.164275 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.164789 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.166126 kernel: Failed to create system directory sunrpc May 17 00:44:04.166215 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.168092 kernel: Failed to create system directory sunrpc May 17 00:44:04.168204 kernel: Failed to create system directory sunrpc May 17 00:44:04.168234 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.169200 kernel: Failed to create system directory sunrpc May 17 00:44:04.169278 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.169792 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.171149 kernel: Failed to create system directory sunrpc May 17 00:44:04.171269 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.172366 kernel: Failed to create system directory sunrpc May 17 00:44:04.172420 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.172792 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.174157 kernel: Failed to create system directory sunrpc May 17 00:44:04.174238 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.174728 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.176059 kernel: Failed to create system directory sunrpc May 17 00:44:04.176194 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.176834 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.177825 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.179526 kernel: Failed to create system directory sunrpc May 17 00:44:04.179614 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.180207 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.181260 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.185120 kernel: Failed to create system directory sunrpc May 17 00:44:04.185236 kernel: Failed to create system directory sunrpc May 17 00:44:04.185383 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.187457 kernel: Failed to create system directory sunrpc May 17 00:44:04.187602 kernel: Failed to create system directory sunrpc May 17 00:44:04.187644 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.188215 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.188991 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.189947 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.191603 kernel: Failed to create system directory sunrpc May 17 00:44:04.191743 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.192356 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.194007 kernel: Failed to create system directory sunrpc May 17 00:44:04.194121 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.196587 kernel: Failed to create system directory sunrpc May 17 00:44:04.196718 kernel: Failed to create system directory sunrpc May 17 00:44:04.196749 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.197439 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.198253 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.199026 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.201447 kernel: Failed to create system directory sunrpc May 17 00:44:04.201558 kernel: Failed to create system directory sunrpc May 17 00:44:04.201604 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.202125 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.203150 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.203726 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.205370 kernel: Failed to create system directory sunrpc May 17 00:44:04.205496 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.206112 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.207837 kernel: Failed to create system directory sunrpc May 17 00:44:04.207929 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.209530 kernel: Failed to create system directory sunrpc May 17 00:44:04.209703 kernel: Failed to create system directory sunrpc May 17 00:44:04.093000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.223391 kernel: RPC: Registered named UNIX socket transport module. May 17 00:44:04.223624 kernel: RPC: Registered udp transport module. May 17 00:44:04.223700 kernel: RPC: Registered tcp transport module. May 17 00:44:04.223728 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 17 00:44:04.093000 audit[2825]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5633b0ff8ad0 a1=1a814c a2=5633af0262b0 a3=5 items=6 ppid=464 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.093000 audit: CWD cwd="/" May 17 00:44:04.093000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:44:04.093000 audit: PATH item=1 name=(null) inode=23118 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:44:04.093000 audit: PATH item=2 name=(null) inode=23118 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:44:04.093000 audit: PATH item=3 name=(null) inode=23119 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:44:04.093000 audit: PATH item=4 name=(null) inode=23118 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:44:04.093000 audit: PATH item=5 name=(null) inode=23120 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:44:04.093000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.284683 kernel: Failed to create system directory nfs May 17 00:44:04.284736 kernel: Failed to create system directory nfs May 17 00:44:04.284766 kernel: Failed to create system directory nfs May 17 00:44:04.284951 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.285181 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.286079 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.287331 kernel: Failed to create system directory nfs May 17 00:44:04.287439 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.289326 kernel: Failed to create system directory nfs May 17 00:44:04.289431 kernel: Failed to create system directory nfs May 17 00:44:04.289468 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.290155 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.292315 kernel: Failed to create system directory nfs May 17 00:44:04.292436 kernel: Failed to create system directory nfs May 17 00:44:04.292476 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.293021 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.294400 kernel: Failed to create system directory nfs May 17 00:44:04.294498 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.295024 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.295947 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.297138 kernel: Failed to create system directory nfs May 17 00:44:04.297190 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.298339 kernel: Failed to create system directory nfs May 17 00:44:04.298429 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.300199 kernel: Failed to create system directory nfs May 17 00:44:04.300294 kernel: Failed to create system directory nfs May 17 00:44:04.300351 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.300749 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.302261 kernel: Failed to create system directory nfs May 17 00:44:04.302410 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.304400 kernel: Failed to create system directory nfs May 17 00:44:04.304513 kernel: Failed to create system directory nfs May 17 00:44:04.304558 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.305054 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.305822 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.307144 kernel: Failed to create system directory nfs May 17 00:44:04.307245 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.308326 kernel: Failed to create system directory nfs May 17 00:44:04.308423 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.308936 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.310102 kernel: Failed to create system directory nfs May 17 00:44:04.310206 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.310810 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.312565 kernel: Failed to create system directory nfs May 17 00:44:04.312705 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.314075 kernel: Failed to create system directory nfs May 17 00:44:04.314200 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.316618 kernel: Failed to create system directory nfs May 17 00:44:04.316762 kernel: Failed to create system directory nfs May 17 00:44:04.316868 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.323354 kernel: Failed to create system directory nfs May 17 00:44:04.323479 kernel: Failed to create system directory nfs May 17 00:44:04.323543 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.325291 kernel: Failed to create system directory nfs May 17 00:44:04.325428 kernel: Failed to create system directory nfs May 17 00:44:04.325506 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.326029 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.327253 kernel: Failed to create system directory nfs May 17 00:44:04.327352 kernel: Failed to create system directory nfs May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.267000 audit[2825]: AVC avc: denied { confidentiality } for pid=2825 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.328902 kernel: Failed to create system directory nfs May 17 00:44:04.357601 kernel: FS-Cache: Netfs 'nfs' registered for caching May 17 00:44:04.267000 audit[2825]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5633b1219a10 a1=16eae4 a2=5633af0262b0 a3=5 items=0 ppid=464 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.267000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.419404 kernel: Failed to create system directory nfs4 May 17 00:44:04.419542 kernel: Failed to create system directory nfs4 May 17 00:44:04.419573 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.420924 kernel: Failed to create system directory nfs4 May 17 00:44:04.421024 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.422113 kernel: Failed to create system directory nfs4 May 17 00:44:04.422191 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.423435 kernel: Failed to create system directory nfs4 May 17 00:44:04.423525 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.424885 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.426103 kernel: Failed to create system directory nfs4 May 17 00:44:04.426195 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.427361 kernel: Failed to create system directory nfs4 May 17 00:44:04.427456 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.429308 kernel: Failed to create system directory nfs4 May 17 00:44:04.429397 kernel: Failed to create system directory nfs4 May 17 00:44:04.429433 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.431335 kernel: Failed to create system directory nfs4 May 17 00:44:04.431426 kernel: Failed to create system directory nfs4 May 17 00:44:04.431448 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.432011 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.463737 kernel: Failed to create system directory nfs4 May 17 00:44:04.463989 kernel: Failed to create system directory nfs4 May 17 00:44:04.464049 kernel: Failed to create system directory nfs4 May 17 00:44:04.464078 kernel: Failed to create system directory nfs4 May 17 00:44:04.464108 kernel: Failed to create system directory nfs4 May 17 00:44:04.464143 kernel: Failed to create system directory nfs4 May 17 00:44:04.464171 kernel: Failed to create system directory nfs4 May 17 00:44:04.464198 kernel: Failed to create system directory nfs4 May 17 00:44:04.464233 kernel: Failed to create system directory nfs4 May 17 00:44:04.464265 kernel: Failed to create system directory nfs4 May 17 00:44:04.464291 kernel: Failed to create system directory nfs4 May 17 00:44:04.464516 kernel: Failed to create system directory nfs4 May 17 00:44:04.464565 kernel: Failed to create system directory nfs4 May 17 00:44:04.464594 kernel: Failed to create system directory nfs4 May 17 00:44:04.464620 kernel: Failed to create system directory nfs4 May 17 00:44:04.464696 kernel: Failed to create system directory nfs4 May 17 00:44:04.464725 kernel: Failed to create system directory nfs4 May 17 00:44:04.464751 kernel: Failed to create system directory nfs4 May 17 00:44:04.464777 kernel: Failed to create system directory nfs4 May 17 00:44:04.464804 kernel: Failed to create system directory nfs4 May 17 00:44:04.464850 kernel: Failed to create system directory nfs4 May 17 00:44:04.464885 kernel: Failed to create system directory nfs4 May 17 00:44:04.464911 kernel: Failed to create system directory nfs4 May 17 00:44:04.464937 kernel: Failed to create system directory nfs4 May 17 00:44:04.465103 kernel: Failed to create system directory nfs4 May 17 00:44:04.465141 kernel: Failed to create system directory nfs4 May 17 00:44:04.465168 kernel: Failed to create system directory nfs4 May 17 00:44:04.465194 kernel: Failed to create system directory nfs4 May 17 00:44:04.465220 kernel: Failed to create system directory nfs4 May 17 00:44:04.465246 kernel: Failed to create system directory nfs4 May 17 00:44:04.465273 kernel: Failed to create system directory nfs4 May 17 00:44:04.465299 kernel: Failed to create system directory nfs4 May 17 00:44:04.465325 kernel: Failed to create system directory nfs4 May 17 00:44:04.465356 kernel: Failed to create system directory nfs4 May 17 00:44:04.465388 kernel: Failed to create system directory nfs4 May 17 00:44:04.465415 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.466357 kernel: Failed to create system directory nfs4 May 17 00:44:04.466421 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.466893 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.468284 kernel: Failed to create system directory nfs4 May 17 00:44:04.468383 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.468798 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.470121 kernel: Failed to create system directory nfs4 May 17 00:44:04.470187 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.471353 kernel: Failed to create system directory nfs4 May 17 00:44:04.471448 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.471898 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.473186 kernel: Failed to create system directory nfs4 May 17 00:44:04.473373 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.475280 kernel: Failed to create system directory nfs4 May 17 00:44:04.475373 kernel: Failed to create system directory nfs4 May 17 00:44:04.475409 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.475809 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.477080 kernel: Failed to create system directory nfs4 May 17 00:44:04.477191 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.478244 kernel: Failed to create system directory nfs4 May 17 00:44:04.478342 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.478783 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.480107 kernel: Failed to create system directory nfs4 May 17 00:44:04.480199 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.481245 kernel: Failed to create system directory nfs4 May 17 00:44:04.481370 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.483151 kernel: Failed to create system directory nfs4 May 17 00:44:04.483248 kernel: Failed to create system directory nfs4 May 17 00:44:04.483284 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.484276 kernel: Failed to create system directory nfs4 May 17 00:44:04.484360 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.486415 kernel: Failed to create system directory nfs4 May 17 00:44:04.486540 kernel: Failed to create system directory nfs4 May 17 00:44:04.486576 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.487191 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.487928 kernel: Failed to create system directory nfs4 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.395000 audit[2831]: AVC avc: denied { confidentiality } for pid=2831 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.489003 kernel: Failed to create system directory nfs4 May 17 00:44:04.517494 kubelet[1436]: E0517 00:44:04.517404 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:04.663297 kernel: NFS: Registering the id_resolver key type May 17 00:44:04.663991 kernel: Key type id_resolver registered May 17 00:44:04.664613 kernel: Key type id_legacy registered May 17 00:44:04.395000 audit[2831]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f27b386f010 a1=209404 a2=55bd5ce552b0 a3=5 items=0 ppid=464 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.395000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.682824 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.688162 kernel: Failed to create system directory rpcgss May 17 00:44:04.688302 kernel: Failed to create system directory rpcgss May 17 00:44:04.688359 kernel: Failed to create system directory rpcgss May 17 00:44:04.688384 kernel: Failed to create system directory rpcgss May 17 00:44:04.688403 kernel: Failed to create system directory rpcgss May 17 00:44:04.688422 kernel: Failed to create system directory rpcgss May 17 00:44:04.688460 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.689291 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.690007 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.691355 kernel: Failed to create system directory rpcgss May 17 00:44:04.691438 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.691964 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.693453 kernel: Failed to create system directory rpcgss May 17 00:44:04.693536 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.694078 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.695332 kernel: Failed to create system directory rpcgss May 17 00:44:04.695428 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.695892 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.697246 kernel: Failed to create system directory rpcgss May 17 00:44:04.697368 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.697859 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.699143 kernel: Failed to create system directory rpcgss May 17 00:44:04.699238 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.699772 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.676000 audit[2832]: AVC avc: denied { confidentiality } for pid=2832 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:44:04.701064 kernel: Failed to create system directory rpcgss May 17 00:44:04.676000 audit[2832]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe5436a9010 a1=70b64 a2=55a9beca62b0 a3=5 items=0 ppid=464 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:04.676000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 17 00:44:05.461043 kubelet[1436]: E0517 00:44:05.460973 1436 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:05.490029 env[1187]: time="2025-05-17T00:44:05.489963254Z" level=info msg="StopPodSandbox for \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\"" May 17 00:44:05.518353 kubelet[1436]: E0517 00:44:05.518301 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:05.614781 env[1187]: 2025-05-17 00:44:05.546 [WARNING][2849] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"14a29283-7c6b-4438-8f1e-095af8425f2a", ResourceVersion:"1404", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"137.184.33.91", ContainerID:"f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e", Pod:"nginx-deployment-7fcdb87857-ggprp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.84.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2ea2787b5bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:05.614781 env[1187]: 2025-05-17 00:44:05.547 [INFO][2849] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:44:05.614781 env[1187]: 2025-05-17 00:44:05.547 [INFO][2849] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" iface="eth0" netns="" May 17 00:44:05.614781 env[1187]: 2025-05-17 00:44:05.547 [INFO][2849] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:44:05.614781 env[1187]: 2025-05-17 00:44:05.547 [INFO][2849] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:44:05.614781 env[1187]: 2025-05-17 00:44:05.585 [INFO][2856] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" HandleID="k8s-pod-network.f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" Workload="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:44:05.614781 env[1187]: 2025-05-17 00:44:05.585 [INFO][2856] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:05.614781 env[1187]: 2025-05-17 00:44:05.586 [INFO][2856] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:05.614781 env[1187]: 2025-05-17 00:44:05.603 [WARNING][2856] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" HandleID="k8s-pod-network.f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" Workload="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:44:05.614781 env[1187]: 2025-05-17 00:44:05.603 [INFO][2856] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" HandleID="k8s-pod-network.f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" Workload="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:44:05.614781 env[1187]: 2025-05-17 00:44:05.609 [INFO][2856] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:05.614781 env[1187]: 2025-05-17 00:44:05.611 [INFO][2849] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:44:05.615971 env[1187]: time="2025-05-17T00:44:05.614826940Z" level=info msg="TearDown network for sandbox \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\" successfully" May 17 00:44:05.615971 env[1187]: time="2025-05-17T00:44:05.614875198Z" level=info msg="StopPodSandbox for \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\" returns successfully" May 17 00:44:05.615971 env[1187]: time="2025-05-17T00:44:05.615905940Z" level=info msg="RemovePodSandbox for \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\"" May 17 00:44:05.616127 env[1187]: time="2025-05-17T00:44:05.615945096Z" level=info msg="Forcibly stopping sandbox \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\"" May 17 00:44:05.757659 env[1187]: 2025-05-17 00:44:05.693 [WARNING][2871] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"14a29283-7c6b-4438-8f1e-095af8425f2a", ResourceVersion:"1404", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"137.184.33.91", ContainerID:"f8e3578b17d5e96e2d311552ee0dba5eee83443a9cf6576d09e25791143f953e", Pod:"nginx-deployment-7fcdb87857-ggprp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.84.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2ea2787b5bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:05.757659 env[1187]: 2025-05-17 00:44:05.694 [INFO][2871] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:44:05.757659 env[1187]: 2025-05-17 00:44:05.694 [INFO][2871] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" iface="eth0" netns="" May 17 00:44:05.757659 env[1187]: 2025-05-17 00:44:05.694 [INFO][2871] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:44:05.757659 env[1187]: 2025-05-17 00:44:05.694 [INFO][2871] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:44:05.757659 env[1187]: 2025-05-17 00:44:05.727 [INFO][2882] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" HandleID="k8s-pod-network.f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" Workload="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:44:05.757659 env[1187]: 2025-05-17 00:44:05.727 [INFO][2882] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:05.757659 env[1187]: 2025-05-17 00:44:05.727 [INFO][2882] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:05.757659 env[1187]: 2025-05-17 00:44:05.749 [WARNING][2882] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" HandleID="k8s-pod-network.f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" Workload="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:44:05.757659 env[1187]: 2025-05-17 00:44:05.749 [INFO][2882] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" HandleID="k8s-pod-network.f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" Workload="137.184.33.91-k8s-nginx--deployment--7fcdb87857--ggprp-eth0" May 17 00:44:05.757659 env[1187]: 2025-05-17 00:44:05.753 [INFO][2882] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:05.757659 env[1187]: 2025-05-17 00:44:05.755 [INFO][2871] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83" May 17 00:44:05.758372 env[1187]: time="2025-05-17T00:44:05.757610903Z" level=info msg="TearDown network for sandbox \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\" successfully" May 17 00:44:05.761402 env[1187]: time="2025-05-17T00:44:05.761347169Z" level=info msg="RemovePodSandbox \"f61d182aa0b112ca59ee18948f75443d31e417c3d1aeb27ef05f761e86228b83\" returns successfully" May 17 00:44:05.762473 env[1187]: time="2025-05-17T00:44:05.762429962Z" level=info msg="StopPodSandbox for \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\"" May 17 00:44:05.889014 env[1187]: 2025-05-17 00:44:05.834 [WARNING][2896] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"137.184.33.91-k8s-csi--node--driver--6lqkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1a3ba9f2-6638-45de-97a2-7ec41db800d6", ResourceVersion:"1387", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"137.184.33.91", ContainerID:"2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932", Pod:"csi-node-driver-6lqkv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.84.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califb08dd270b1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:05.889014 env[1187]: 2025-05-17 00:44:05.835 [INFO][2896] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:44:05.889014 env[1187]: 2025-05-17 00:44:05.835 [INFO][2896] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" iface="eth0" netns="" May 17 00:44:05.889014 env[1187]: 2025-05-17 00:44:05.835 [INFO][2896] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:44:05.889014 env[1187]: 2025-05-17 00:44:05.835 [INFO][2896] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:44:05.889014 env[1187]: 2025-05-17 00:44:05.868 [INFO][2904] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" HandleID="k8s-pod-network.1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" Workload="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:44:05.889014 env[1187]: 2025-05-17 00:44:05.869 [INFO][2904] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:05.889014 env[1187]: 2025-05-17 00:44:05.869 [INFO][2904] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:05.889014 env[1187]: 2025-05-17 00:44:05.881 [WARNING][2904] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" HandleID="k8s-pod-network.1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" Workload="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:44:05.889014 env[1187]: 2025-05-17 00:44:05.881 [INFO][2904] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" HandleID="k8s-pod-network.1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" Workload="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:44:05.889014 env[1187]: 2025-05-17 00:44:05.885 [INFO][2904] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:05.889014 env[1187]: 2025-05-17 00:44:05.887 [INFO][2896] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:44:05.890011 env[1187]: time="2025-05-17T00:44:05.889950142Z" level=info msg="TearDown network for sandbox \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\" successfully" May 17 00:44:05.890174 env[1187]: time="2025-05-17T00:44:05.890148556Z" level=info msg="StopPodSandbox for \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\" returns successfully" May 17 00:44:05.891007 env[1187]: time="2025-05-17T00:44:05.890968761Z" level=info msg="RemovePodSandbox for \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\"" May 17 00:44:05.891357 env[1187]: time="2025-05-17T00:44:05.891294901Z" level=info msg="Forcibly stopping sandbox \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\"" May 17 00:44:06.010536 env[1187]: 2025-05-17 00:44:05.959 [WARNING][2918] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"137.184.33.91-k8s-csi--node--driver--6lqkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1a3ba9f2-6638-45de-97a2-7ec41db800d6", ResourceVersion:"1387", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"137.184.33.91", ContainerID:"2d9dc9f502f20d8d0bc8491c19821b8fab1783e958d8ad01018c7a761dfc7932", Pod:"csi-node-driver-6lqkv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.84.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califb08dd270b1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:06.010536 env[1187]: 2025-05-17 00:44:05.961 [INFO][2918] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:44:06.010536 env[1187]: 2025-05-17 00:44:05.961 [INFO][2918] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" iface="eth0" netns="" May 17 00:44:06.010536 env[1187]: 2025-05-17 00:44:05.961 [INFO][2918] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:44:06.010536 env[1187]: 2025-05-17 00:44:05.961 [INFO][2918] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:44:06.010536 env[1187]: 2025-05-17 00:44:05.989 [INFO][2925] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" HandleID="k8s-pod-network.1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" Workload="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:44:06.010536 env[1187]: 2025-05-17 00:44:05.990 [INFO][2925] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:06.010536 env[1187]: 2025-05-17 00:44:05.990 [INFO][2925] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:06.010536 env[1187]: 2025-05-17 00:44:06.001 [WARNING][2925] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" HandleID="k8s-pod-network.1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" Workload="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:44:06.010536 env[1187]: 2025-05-17 00:44:06.001 [INFO][2925] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" HandleID="k8s-pod-network.1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" Workload="137.184.33.91-k8s-csi--node--driver--6lqkv-eth0" May 17 00:44:06.010536 env[1187]: 2025-05-17 00:44:06.006 [INFO][2925] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:06.010536 env[1187]: 2025-05-17 00:44:06.008 [INFO][2918] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd" May 17 00:44:06.011841 env[1187]: time="2025-05-17T00:44:06.010484730Z" level=info msg="TearDown network for sandbox \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\" successfully" May 17 00:44:06.014265 env[1187]: time="2025-05-17T00:44:06.014197104Z" level=info msg="RemovePodSandbox \"1395614e58fe3827fd8e7111ffc73ab84a98cb17edd4ee94f7f20c2146e3b1dd\" returns successfully" May 17 00:44:06.519393 kubelet[1436]: E0517 00:44:06.519327 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:07.520085 kubelet[1436]: E0517 00:44:07.520010 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:08.520572 kubelet[1436]: E0517 00:44:08.520479 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:09.520741 kubelet[1436]: E0517 00:44:09.520679 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:10.522329 kubelet[1436]: E0517 00:44:10.522245 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:10.862918 nfsidmap[2839]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-82bffd3759' May 17 00:44:11.523435 kubelet[1436]: E0517 00:44:11.523374 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:12.525327 kubelet[1436]: E0517 00:44:12.525256 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:13.526396 kubelet[1436]: E0517 00:44:13.526313 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:14.527147 kubelet[1436]: E0517 00:44:14.527088 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:15.528766 kubelet[1436]: E0517 00:44:15.528704 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:16.530006 kubelet[1436]: E0517 00:44:16.529896 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:17.001347 nfsidmap[2941]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-82bffd3759' May 17 00:44:17.016000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:44:17.018169 kernel: kauditd_printk_skb: 333 callbacks suppressed May 17 00:44:17.018263 kernel: audit: type=1400 audit(1747442657.016:780): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:44:17.016000 audit[1258]: AVC avc: denied { watch_reads } for pid=1258 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:44:17.023932 kernel: audit: type=1400 audit(1747442657.016:781): avc: denied { watch_reads } for pid=1258 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:44:17.016000 audit[1258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=558ac7fdb0b0 a2=10 a3=3ea733dfe2943c4a items=0 ppid=1 pid=1258 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:17.028479 kernel: audit: type=1300 audit(1747442657.016:781): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=558ac7fdb0b0 a2=10 a3=3ea733dfe2943c4a items=0 ppid=1 pid=1258 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:17.028927 kernel: audit: type=1327 audit(1747442657.016:781): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:44:17.016000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:44:17.016000 audit[1258]: AVC avc: denied { watch_reads } for pid=1258 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:44:17.033075 kernel: audit: type=1400 audit(1747442657.016:782): avc: denied { watch_reads } for pid=1258 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:44:17.033285 kernel: audit: type=1300 audit(1747442657.016:782): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=558ac7fdb0b0 a2=10 a3=3ea733dfe2943c4a items=0 ppid=1 pid=1258 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:17.016000 audit[1258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=558ac7fdb0b0 a2=10 a3=3ea733dfe2943c4a items=0 ppid=1 pid=1258 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:17.016000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:44:17.038850 kernel: audit: type=1327 audit(1747442657.016:782): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:44:17.039047 kernel: audit: type=1400 audit(1747442657.020:783): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:44:17.020000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:44:17.248412 env[1187]: time="2025-05-17T00:44:17.248345839Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:bcf52181-aff8-4f2a-b973-952b8f0efe99,Namespace:default,Attempt:0,}" May 17 00:44:17.507745 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:44:17.507982 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 17 00:44:17.508132 systemd-networkd[998]: cali5ec59c6bf6e: Link UP May 17 00:44:17.508457 systemd-networkd[998]: cali5ec59c6bf6e: Gained carrier May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.323 [INFO][2951] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {137.184.33.91-k8s-test--pod--1-eth0 default bcf52181-aff8-4f2a-b973-952b8f0efe99 1519 0 2025-05-17 00:43:52 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 137.184.33.91 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="137.184.33.91-k8s-test--pod--1-" May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.323 [INFO][2951] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="137.184.33.91-k8s-test--pod--1-eth0" May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.376 [INFO][2964] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" HandleID="k8s-pod-network.fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" Workload="137.184.33.91-k8s-test--pod--1-eth0" May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.377 [INFO][2964] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" HandleID="k8s-pod-network.fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" Workload="137.184.33.91-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9020), Attrs:map[string]string{"namespace":"default", "node":"137.184.33.91", "pod":"test-pod-1", "timestamp":"2025-05-17 00:44:17.376499317 +0000 UTC"}, Hostname:"137.184.33.91", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.377 [INFO][2964] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.377 [INFO][2964] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.377 [INFO][2964] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '137.184.33.91' May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.404 [INFO][2964] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" host="137.184.33.91" May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.419 [INFO][2964] ipam/ipam.go 394: Looking up existing affinities for host host="137.184.33.91" May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.433 [INFO][2964] ipam/ipam.go 511: Trying affinity for 192.168.84.64/26 host="137.184.33.91" May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.438 [INFO][2964] ipam/ipam.go 158: Attempting to load block cidr=192.168.84.64/26 host="137.184.33.91" May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.442 [INFO][2964] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.84.64/26 host="137.184.33.91" May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.442 [INFO][2964] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.84.64/26 handle="k8s-pod-network.fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" host="137.184.33.91" May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.446 [INFO][2964] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.487 [INFO][2964] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.84.64/26 handle="k8s-pod-network.fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" host="137.184.33.91" May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.498 [INFO][2964] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.84.68/26] block=192.168.84.64/26 handle="k8s-pod-network.fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" host="137.184.33.91" May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.498 [INFO][2964] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.84.68/26] handle="k8s-pod-network.fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" host="137.184.33.91" May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.498 [INFO][2964] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.498 [INFO][2964] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.84.68/26] IPv6=[] ContainerID="fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" HandleID="k8s-pod-network.fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" Workload="137.184.33.91-k8s-test--pod--1-eth0" May 17 00:44:17.525504 env[1187]: 2025-05-17 00:44:17.500 [INFO][2951] cni-plugin/k8s.go 418: Populated endpoint ContainerID="fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="137.184.33.91-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"137.184.33.91-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"bcf52181-aff8-4f2a-b973-952b8f0efe99", ResourceVersion:"1519", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"137.184.33.91", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.84.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:17.527037 env[1187]: 2025-05-17 00:44:17.500 [INFO][2951] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.84.68/32] ContainerID="fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="137.184.33.91-k8s-test--pod--1-eth0" May 17 00:44:17.527037 env[1187]: 2025-05-17 00:44:17.500 [INFO][2951] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="137.184.33.91-k8s-test--pod--1-eth0" May 17 00:44:17.527037 env[1187]: 2025-05-17 00:44:17.507 [INFO][2951] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="137.184.33.91-k8s-test--pod--1-eth0" May 17 00:44:17.527037 env[1187]: 2025-05-17 00:44:17.508 [INFO][2951] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="137.184.33.91-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"137.184.33.91-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"bcf52181-aff8-4f2a-b973-952b8f0efe99", ResourceVersion:"1519", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 43, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"137.184.33.91", ContainerID:"fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.84.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"46:92:33:0a:a5:37", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:44:17.527037 env[1187]: 2025-05-17 00:44:17.522 [INFO][2951] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="137.184.33.91-k8s-test--pod--1-eth0" May 17 00:44:17.537876 kubelet[1436]: E0517 00:44:17.530859 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:17.545415 env[1187]: time="2025-05-17T00:44:17.545283110Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:44:17.545415 env[1187]: time="2025-05-17T00:44:17.545349840Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:44:17.545415 env[1187]: time="2025-05-17T00:44:17.545369031Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:44:17.546205 env[1187]: time="2025-05-17T00:44:17.546127790Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf pid=2984 runtime=io.containerd.runc.v2 May 17 00:44:17.566000 audit[2996]: NETFILTER_CFG table=filter:82 family=2 entries=40 op=nft_register_chain pid=2996 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:17.566000 audit[2996]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd923e4c40 a2=0 a3=7ffd923e4c2c items=0 ppid=2080 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:17.575123 kernel: audit: type=1325 audit(1747442657.566:784): table=filter:82 family=2 entries=40 op=nft_register_chain pid=2996 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:44:17.575341 kernel: audit: type=1300 audit(1747442657.566:784): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd923e4c40 a2=0 a3=7ffd923e4c2c items=0 ppid=2080 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:17.566000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:44:17.585331 systemd[1]: Started cri-containerd-fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf.scope. May 17 00:44:17.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.615000 audit: BPF prog-id=126 op=LOAD May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2984 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:17.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661316330313662633339353237313038306431393463363135336335 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2984 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:17.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661316330313662633339353237313038306431393463363135336335 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit: BPF prog-id=127 op=LOAD May 17 00:44:17.616000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000321a60 items=0 ppid=2984 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:17.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661316330313662633339353237313038306431393463363135336335 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit: BPF prog-id=128 op=LOAD May 17 00:44:17.616000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000321aa8 items=0 ppid=2984 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:17.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661316330313662633339353237313038306431393463363135336335 May 17 00:44:17.616000 audit: BPF prog-id=128 op=UNLOAD May 17 00:44:17.616000 audit: BPF prog-id=127 op=UNLOAD May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:17.616000 audit: BPF prog-id=129 op=LOAD May 17 00:44:17.616000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000321eb8 items=0 ppid=2984 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:17.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661316330313662633339353237313038306431393463363135336335 May 17 00:44:17.672421 env[1187]: time="2025-05-17T00:44:17.672347264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:bcf52181-aff8-4f2a-b973-952b8f0efe99,Namespace:default,Attempt:0,} returns sandbox id \"fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf\"" May 17 00:44:17.674649 env[1187]: time="2025-05-17T00:44:17.674583136Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:44:18.019144 env[1187]: time="2025-05-17T00:44:18.019055202Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:18.021810 env[1187]: time="2025-05-17T00:44:18.021747471Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:18.024053 env[1187]: time="2025-05-17T00:44:18.023987406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:18.026593 env[1187]: time="2025-05-17T00:44:18.026526999Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:44:18.028297 env[1187]: time="2025-05-17T00:44:18.028146380Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:44:18.037114 env[1187]: time="2025-05-17T00:44:18.037040107Z" level=info msg="CreateContainer within sandbox \"fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 17 00:44:18.055923 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1925547221.mount: Deactivated successfully. May 17 00:44:18.065304 env[1187]: time="2025-05-17T00:44:18.065229137Z" level=info msg="CreateContainer within sandbox \"fa1c016bc395271080d194c6153c52dbc93c8c12c382a517146564de91d78abf\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"9f9b7489d82e8e307ff9a9293a2eb4db7998676253e78e92b0d781860034aaaf\"" May 17 00:44:18.067093 env[1187]: time="2025-05-17T00:44:18.067035980Z" level=info msg="StartContainer for \"9f9b7489d82e8e307ff9a9293a2eb4db7998676253e78e92b0d781860034aaaf\"" May 17 00:44:18.101582 systemd[1]: Started cri-containerd-9f9b7489d82e8e307ff9a9293a2eb4db7998676253e78e92b0d781860034aaaf.scope. May 17 00:44:18.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.128000 audit: BPF prog-id=130 op=LOAD May 17 00:44:18.129000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.129000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2984 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:18.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396237343839643832653865333037666639613932393361326562 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2984 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:18.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396237343839643832653865333037666639613932393361326562 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit: BPF prog-id=131 op=LOAD May 17 00:44:18.130000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020e910 items=0 ppid=2984 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:18.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396237343839643832653865333037666639613932393361326562 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit: BPF prog-id=132 op=LOAD May 17 00:44:18.130000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020e958 items=0 ppid=2984 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:18.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396237343839643832653865333037666639613932393361326562 May 17 00:44:18.130000 audit: BPF prog-id=132 op=UNLOAD May 17 00:44:18.130000 audit: BPF prog-id=131 op=UNLOAD May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:44:18.130000 audit: BPF prog-id=133 op=LOAD May 17 00:44:18.130000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020ed68 items=0 ppid=2984 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:44:18.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396237343839643832653865333037666639613932393361326562 May 17 00:44:18.161139 env[1187]: time="2025-05-17T00:44:18.161059792Z" level=info msg="StartContainer for \"9f9b7489d82e8e307ff9a9293a2eb4db7998676253e78e92b0d781860034aaaf\" returns successfully" May 17 00:44:18.531527 kubelet[1436]: E0517 00:44:18.531447 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:18.664975 systemd-networkd[998]: cali5ec59c6bf6e: Gained IPv6LL May 17 00:44:19.532609 kubelet[1436]: E0517 00:44:19.532517 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:20.533133 kubelet[1436]: E0517 00:44:20.533068 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:21.534339 kubelet[1436]: E0517 00:44:21.534249 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:22.535518 kubelet[1436]: E0517 00:44:22.535435 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:44:23.535713 kubelet[1436]: E0517 00:44:23.535610 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"